Ad

CVE-2026-5463

CRITICAL CVSS 4.0: 9.3
Updated Apr 03, 2026
Dan Mcinerney
Parameter Value
CVSS 9.3 (CRITICAL)
Type CWE-77 (Command Injection)
Vendor Dan Mcinerney
Public PoC No

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Attack Requirements
None
No additional conditions
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
High
Complete data modification
Availability
Low
Partial disruption

CVSS Vector v4.0

Weakness Type (CWE)

Vulnerable Products

dan mcinerney:pymetasploit3