TopVuln

High-risk vulnerability digests

CVE-2026-5463

  • CRITICAL

Details

CVSS v3
8.6
CVSS v4
9.3
CVSS v2
7.5
NVD published
2026-04-03 05:16:24
EPSS
1.7% probability · 82.6th percentile — 2026-05-12
Affected versions
pymetasploit3 versions 1.0.6 and earlier
Summary
This is a command injection vulnerability in the console.run_module_with_output() function of the pymetasploit3 library. Attackers can inject newline characters into module options such as RHOSTS, which breaks the intended command structure and allows execution of unintended malicious commands. Successful exploitation can lead to full arbitrary command execution and manipulation of existing Metasploit sessions.
Remediation
Upgrade pymetasploit3 to a patched version once it is made available. If an update cannot be applied immediately, restrict access to systems running pymetasploit3 to only trusted, authenticated users. Regularly audit command execution activity on systems running the vulnerable library.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.