Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qpc3-8vqg-8g6w | pymetasploit3 vulnerable to command injection in console.run_module_with_output() |
Fri, 03 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Command Injection in pymetasploit3 Enables Arbitrary Command Execution | |
| First Time appeared |
Dan Mcinerney
Dan Mcinerney pymetasploit3 |
|
| Vendors & Products |
Dan Mcinerney
Dan Mcinerney pymetasploit3 |
Fri, 03 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions. | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: TuranSec
Published:
Updated: 2026-04-03T15:35:09.337Z
Reserved: 2026-04-03T04:28:08.555Z
Link: CVE-2026-5463
Updated: 2026-04-03T15:34:55.762Z
Status : Awaiting Analysis
Published: 2026-04-03T05:16:24.160
Modified: 2026-04-03T16:10:23.730
Link: CVE-2026-5463
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:15:47Z
Github GHSA