<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Metasploit - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Mon, 20 Apr 2026 03:17:22 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/metasploit/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 04/17/2026]]></title>
      <description><![CDATA[<h2>Happy Friday - Seven New Metasploit Modules</h2><p>We’re happy to announce that Metasploit Framework had a big week, landing seven new modules alongside various bug fixes and enhancements. This week’s highlights include RCE modules targeting AVideo, openDCIM, Selenium Grid/Selenoid, and ChurchCRM. On the post-exploitation side, Windows saw three new persistence techniques added as modules, targeting Telemetry scheduled tasks, PowerShell profiles, and Microsoft BITS.</p><p>What a time to be alive as a Metasploit user! We wish you all a wonderful weekend and happy hacking.</p><h2>New module content (7)</h2><h3>AVideo Unauthenticated SQL Injection Credential Dump</h3><p>Authors: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> and arkmarta</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21075">#21075</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: gather/avideo_catname_sqli</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-28501&amp;referrer=blog">CVE-2026-28501</a></p><p>Description: Adds an auxiliary module for CVE-2026-28501, an unauthenticated SQL injection in AVideo &lt;= 22.0, along with a new BenchmarkBasedBlind SQLi mixin class and blind extraction improvements.</p><h3>openDCIM install.php SQL Injection to RCE</h3><p>Author: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a></p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21034">#21034</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: linux/http/opendcim_install_sqli_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-28517&amp;referrer=blog">CVE-2026-28517</a></p><p>Description: This PR adds a new exploit module for openDCIM that chains three vulnerabilities (<a href="https://github.com/advisories/GHSA-mg2w-x76x-59h8">https://github.com/advisories/GHSA-mg2w-x76x-59h8</a>, <a href="https://github.com/advisories/GHSA-prmh-rp39-qc4m">https://github.com/advisories/GHSA-prmh-rp39-qc4m</a>, <a href="https://github.com/advisories/GHSA-428h-8xhf-g3cw">https://github.com/advisories/GHSA-428h-8xhf-g3cw</a>) to achieve remote code execution.</p><h3>Selenium Grid/Selenoid Unauthenticated RCE</h3><p>Authors: Jon Stratton, Takahiro Yokoyama, Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a>, and Wiz Research</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21003">#21003</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: linux/http/selenium_greed_rce</p><p>Description: This replaces the two separate Selenium Grid RCE modules (Chrome and Firefox) with a single unified module that auto-detects available browsers and selects the best attack vector. The module targets unauthenticated Selenium Grid and Selenoid instances, supporting two techniques: a Firefox profile handler injection that works on all Grid versions including the latest (never patched since 2021), and a Chrome binary override for Grid versions prior to 4.11.0 and all Selenoid versions. No authentication is required.</p><h3>ChurchCRM Database Restore RCE 6.2.0</h3><p>Author: LucasCsmt</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21095">#21095</a> contributed by <a href="https://github.com/LucasCsmt">LucasCsmt</a></p><p>Path: multi/http/churchcrm_db_restore_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-68109&amp;referrer=blog">CVE-2025-68109</a></p><p>Description: Adds a new exploit module for CVE-2025-68109, targeting a file upload vulnerability inside ChurchCRM leading to an RCE. This module will work on version 6.2.0 of ChurchCRM and earlier.</p><h3>Windows Persistence Bits Job</h3><p>Author: h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20839">#20839</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: windows/persistence/bits</p><p>Description: This adds a new persistence module that uses Microsoft Bits to maintain access to the system.</p><h3>Powershell Profile Persistence</h3><p>Author: madefourit</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20933">#20933</a> contributed by <a href="https://github.com/madefourit">madefourit</a></p><p>Path: windows/persistence/powershell_profile</p><p>Description: This adds a new persistence module that uses powershell profiles to maintain access.</p><h3>Windows Telemetry Persistence</h3><p>Author: h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20843">#20843</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: windows/persistence/telemetry</p><p>Description: Adds a new persistence module, exploit/windows/persistence/telemetry, that abuses the Windows Telemetry scheduled task (Microsoft Compatibility Appraiser / CompatTelRunner) to establish persistence. The module writes a payload to disk and configures the telemetry task to execute it, resulting in a SYSTEM-level Meterpreter session either on the next scheduled run or immediately on demand. Requires an admin-level Meterpreter session on the target.</p><h2>Enhancements and features (11)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21078">#21078</a> from <a href="https://github.com/Chocapikk">Chocapikk</a> - Adds multiple improvements to the multi/http/churchcrm_install_unauth_rce module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21085">#21085</a> from <a href="https://github.com/dledda-r7">dledda-r7</a> - This refactors the Block API code used by Windows payloads to leverage a new version of the hashing algorithm. This also fixes a bug whereby the MaximumLength field was used when calculating UNICODE_STRING names when it should have been the Length field.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21236">#21236</a> from <a href="https://github.com/bcoles">bcoles</a> - Add riscv64le and riscv32le architecture support to the fileless fetch payload adapter. This enables in-memory ELF execution via memfd_create on RISC-V Linux targets without writing to disk.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21252">#21252</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Adds a new with_adcs_certificate_request method that now used by both the MsIcpr and WebEnrollment mixins that abstracts away the enrollment process and takes a block that performs the actual request. The result is consolidation of messages, post-processing of the successfully issued certificate.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21255">#21255</a> from <a href="https://github.com/mxnvel">mxnvel</a> - This updates two Python payloads (cmd/unix/reverse_python and cmd/unix/reverse_python_ssl) to make the PythonPath option optional. When omitted, it defaults to a shim that will determine the appropriate version of Python at runtime using a small bash expression.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21275">#21275</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Adds multiple improvements to the cve_2025_14847_mongobleed module, such as adding new a dedicated check method, improved compression support detection as only zlib can be exploited, and resolving other false positives.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21286">#21286</a> from <a href="https://github.com/Hemang360">Hemang360</a> - Adds a cleanup keyword argument to Msf::Post::File#mkdir so callers can skip automatic directory cleanup registration. It is very useful for when we create directories in persistence modules and want the directory to remain.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21289">#21289</a> from <a href="https://github.com/sjanusz-r7">sjanusz-r7</a> - Updates the db.hosts RPC call to now additionally include the comments associated with the host.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21291">#21291</a> from <a href="https://github.com/sjanusz-r7">sjanusz-r7</a> - Updates the module.info RPC call to now additionally include the notes associated with the module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21304">#21304</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Improves multiple auxiliary module check code messages and statuses.</li></ul><h2>Bugs fixed (4)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21027">#21027</a> from <a href="https://github.com/SilentSobs">SilentSobs</a> - Fixes ELF shared object (elf-so) payload generation failing on 32-bit ARM Linux and RISC-V 32-bit LE targets. The _start entry point in the ARM LE template was landing at a non-word-aligned offset, which violates the architecture's 4-byte alignment requirement and caused the shared object to fail to load. The templates now use proper NASM align directives to ensure correct entry point alignment, and a similar fix is applied to the RISC-V 32-bit LE template.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21268">#21268</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a crash with a small number of auxiliary modules when the check method was run and the vulnerability wasn't present.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21287">#21287</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Fixes the EXE templates that were rebuilt in <a href="https://github.com/rapid7/metasploit-framework/pull/20502">https://github.com/rapid7/metasploit-framework/pull/20502</a> to work on legacy Windows targets like Server 2000 in case you find yourself in a combination hacking and time-travelling movie.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21309">#21309</a> from <a href="https://github.com/sfewer-r7">sfewer-r7</a> - Fixes a false positive in the fortinet_fortiweb_create_admin module when detecting the presence of an authentication bypass via path traversal vulnerability in the Fortinet FortiWeb management interface.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20843">#20843</a> from <a href="https://github.com/h00die">h00die</a> - Adds a new persistence module, exploit/windows/persistence/telemetry, that abuses the Windows Telemetry scheduled task (Microsoft Compatibility Appraiser / CompatTelRunner) to establish persistence. The module writes a payload to disk and configures the telemetry task to execute it, resulting in a SYSTEM-level Meterpreter session either on the next scheduled run or immediately on demand. Requires an admin-level Meterpreter session on the target.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-08T15%3A01%3A17Z..2026-04-16T14%3A22%3A51%2B01%3A00%22">Pull Requests 6.4.126...6.4.128</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.126...6.4.128">Full diff 6.4.126...6.4.128</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-17-2026</link>
      <guid isPermaLink="false">bltfbdf377c52786428</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Jack Heysel]]></dc:creator>
      <pubDate>Fri, 17 Apr 2026 20:35:42 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 04/10/2026]]></title>
      <description><![CDATA[<h2>Speedup Improvements of MSFVenom & New Modules</h2><p>This week, we have added new modules to Metasploit Framework targeting Cisco Catalyst SD-WAN controllers and osTicket as well as updates and improvements to Windows service-for-user persistence, and LDAP/ADCS-related modules to automatically report related services resulting in an improved data stream, which can be queried by using the services command.</p><p>We also landed an improvement to msfvenom’s bootup time, thanks to <a href="https://github.com/bcoles">bcoles</a>, resulting in an approximate two-times speedup.</p><h2>New module content (4)</h2><h3>AD/CS Authenticated Web Enrollment Services Module</h3><p>Authors: Spencer McIntyre, bwatters-r7, and jhicks-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20752">#20752</a> contributed by <a href="https://github.com/bwatters-r7">bwatters-r7</a></p><p>Path: admin/http/web_enrollment_cert</p><p>Description: This adds a new auxiliary/admin/http/web_enrollment_cert modules that allows certificates to be issued from an Active Directory Certificate Services Web Enrollment portal. Its usage is the same as the auxiliary/admin/http/icpr_cert module but enables operators to issue certificates when the web enrollment portal is accessible but the MS-ICPR service is not.</p><h3>Cisco Catalyst SD-WAN Controller Authentication Bypass</h3><p>Author: sfewer-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21158">#21158</a> contributed by <a href="https://github.com/sfewer-r7">sfewer-r7</a></p><p>Path: admin/networking/cisco_sdwan_auth_bypass</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-20127&amp;referrer=blog">CVE-2026-20127</a></p><p>Description: This adds an auxiliary module to exploit an authentication bypass vulnerability, CVE-2026-20127, affecting Cisco Catalyst SD-WAN Controller. Recently exploited in the wild as a zero-day.</p><h3>osTicket Arbitrary File Read via PHP Filter Chains in mPDF</h3><p>Authors: Arkaprabha Chakraborty &lt;@t1nt1nsn0wy&gt; and HORIZON3.ai Team</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20948">#20948</a> contributed by <a href="https://github.com/ArkaprabhaChakraborty">ArkaprabhaChakraborty</a></p><p>Path: gather/osticket_arbitrary_file_read</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-22200&amp;referrer=blog">CVE-2026-22200</a></p><p>Description: This adds an auxiliary module to exploit, CVE-2026-22200, an authenticated file read vulnerability in osTicket.</p><h3>Windows Service for User (S4U) Scheduled Task Persistence - Event Trigger</h3><p>Authors: Brandon McCann "zeknox" <a href="mailto:bmccann@accuvant.com">bmccann@accuvant.com</a>, Thomas McCarthy "smilingraccoon" <a href="mailto:smilingraccoon@gmail.com">smilingraccoon@gmail.com</a>, and h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20814">#20814</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: windows/persistence/service_for_user/event</p><p>Description: Updates the Windows service-for-user persistence technique.</p><h2>Enhancements and features (7)</h2><ul><li><p><a href="https://github.com/rapid7/metasploit-framework/pull/20814">#20814</a> from <a href="https://github.com/h00die">h00die</a> - Updates the Windows service-for-user persistence technique.</p></li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20973">#20973</a> from <a href="https://github.com/bitstr3m-48">bitstr3m-48</a> - This release enables command execution for non-interactive HWBridge sessions via the sessions -c flag. Additionally, the hwbridge/connect module now preserves parsed JSON error bodies from failed HTTP responses, which improves error messaging.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20977">#20977</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This updates the exploit/unix/webapp/php_eval module to have a FORMDATA datastore option, which adds HTTP POST-request support and makes the HEADERS datastore option consistent with other modules.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20979">#20979</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This updates the exploit/unix/webapp/php_include module with additional datastore options and make its usage more consistent with the similar exploit/unix/webapp/php_eval module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21031">#21031</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Enhances the Metasploit’s LDAP/ADCS-related modules to automatically report related services (LDAP, DCERPC/ICertPassage/ADCS CA) and to improve vulnerability reporting by associating findings with the affected LDAP object’s DN (and, for ADCS template findings, the template name) so results are uniquely keyed and easier to interpret.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21143">#21143</a> from <a href="https://github.com/SaiSakthidar">SaiSakthidar</a> - This bumps the Metasploit payloads to include changes that enable the PHP Meterpreter to open TCP server sockets. This enables operators to listen for inbound connections on compromised hosts and closes a feature gap between PHP and the other Meterpreters.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21229">#21229</a> from <a href="https://github.com/bcoles">bcoles</a> - This updates the msfvenom utility to use the metadata cache. The result is roughly 2x faster execution times when listing modules</li></ul><h2>Bugs fixed (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21153">#21153</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - This fixes an issue with some mutable constant datastore options. Using shared options like CHOST or CPORT are not changing visibility across modules anymore.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21221">#21221</a> from <a href="https://github.com/cgranleese-r7">cgranleese-r7</a> - This PR improves module_doc_template.md with examples to better guide contributors.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-04-02T10%3A24%3A13Z..2026-04-08T15%3A01%3A17Z%22">Pull Requests 6.4.125...6.4.126</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.125...6.4.126">Full diff 6.4.125...6.4.126</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-10-2026</link>
      <guid isPermaLink="false">blte1ac7b403beedf01</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Simon Janusz]]></dc:creator>
      <pubDate>Fri, 10 Apr 2026 19:11:43 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 04/03/2026]]></title>
      <description><![CDATA[<h2>Additional Adapters and More Modules</h2><p>This week, we added a whole new bunch of HTTP/HTTPS-based CMD payloads for X64 and X86 versions of Windows. The additional breadth of selectable payloads and delivery techniques allows users new options to tailor the attack workflow for their environment. This was contributed by <a href="https://github.com/bwatters-r7">bwatters-r7</a>. Adding new architectures for adapted payloads is surprisingly easy and something a first-time contributor might want to look into!</p><p>New modules added to Metasploit Framework also allow for targeting FreeScout and Grav CMS, both of which result in remote code execution. These modules were contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> and <a href="https://github.com/x1o3">x1o3</a> respectively. Thanks!</p><p>Thanks to <a href="https://github.com/g0tmi1k">g0tmi1k</a>, Metasploit Framework now also includes an exploit module, multi/http/os_cmd_exec, which allows for targeting generic HTTP command execution vulnerabilities where user-supplied input is directly passed to system execution functions via an HTTP request. This can result in a Meterpreter shell on the remote target.</p><p>To round this week off, we have a new persistence technique on Windows, thanks to <a href="https://github.com/Nayeraneru">Nayeraneru</a>, which abuses the HKCU\Environment\UserInitMprLogonScript registry value to execute a payload at user logon.</p><h2>New module content (5)</h2><h3>FreeScout Unauthenticated RCE via ZWSP .htaccess Bypass</h3><p>Authors: Moses Bhardwaj (MosesOX) , Nir Zadok (nirzadokox) , Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a>, and offensiveee</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21069">#21069</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: multi/http/freescout_htaccess_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-27636&amp;referrer=blog">CVE-2026-27636</a></p><p>Description: This adds an exploit module for CVE-2026-28289, an unauthenticated remote code execution vulnerability in FreeScout versions prior or equal to 1.8.206.</p><h3>Grav CMS Admin Direct Install Authenticated Plugin Upload RCE</h3><p>Authors: binneko and x1o3</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21029">#21029</a> contributed by <a href="https://github.com/x1o3">x1o3</a></p><p>Path: multi/http/grav_admin_direct_install_rce_cve_2025_50286</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-50286&amp;referrer=blog">CVE-2025-50286</a></p><p>Description: This adds a new exploit module for CVE-2025-50286, an authenticated RCE vulnerability in Grav CMS 1.1.x–1.7.x with Admin Plugin 1.2.x–1.10.x. The module exploits the Direct Install feature to upload a malicious plugin ZIP and execute an arbitrary PHP payload as the web server user.</p><h3>Generic HTTP Command Execution</h3><p>Authors: egypt <a href="mailto:egypt@metasploit.com">egypt@metasploit.com</a> and g0tmi1k</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21023">#21023</a> contributed by <a href="https://github.com/g0tmi1k">g0tmi1k</a></p><p>Path: multi/http/os_cmd_exec</p><p>Description: Adds a new exploits/multi/http/os_cmd_exec module that targets generic HTTP command execution vulnerabilities where user-supplied input is directly passed to system execution functions via an HTTP request.</p><h3>Windows Persistence via UserInitMprLogonScript</h3><p>Author: Nayera</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21032">#21032</a> contributed by <a href="https://github.com/Nayeraneru">Nayeraneru</a></p><p>Path: windows/persistence/userinit_mpr_logon_script</p><p>Description: This adds a new Windows persistence module that abuses the HKCU\Environment\UserInitMprLogonScript registry value to execute a payload at user logon.</p><h3>HTTP and HTTPS Fetch</h3><p>Authors: Brendan Watters, Chris John Riley, hdm <a href="mailto:x@hdm.io">x@hdm.io</a>, sf <a href="mailto:stephen_fewer@harmonysecurity.com">stephen_fewer@harmonysecurity.com</a>, and vlad902 <a href="mailto:vlad902@gmail.com">vlad902@gmail.com</a></p><p>Type: Payload (Adapter)</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21172">#21172</a> contributed by <a href="https://github.com/bwatters-r7">bwatters-r7</a></p><p>Description: This adds HTTP and HTTPS fetch payloads for 32-bit Windows targets.</p><h2>Enhancements and features (8)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20999">#20999</a> from <a href="https://github.com/Aaditya1273">Aaditya1273</a> - Removes the legacy windows/local/persistence module, which has been superseded by the modernized windows/persistence/registry module. A moved_from alias ensures that existing scripts and workflows referencing the old module path are automatically redirected to the new one with a deprecation warning.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21090">#21090</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Updates multiple modules to make use of report_service().</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21097">#21097</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Updates auxiliary/scanner/ftp/anonymous.rb to report the FTP service regardless of anonymous being enabled.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21144">#21144</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - Improves YARD documentation for lib/msf/core/auxiliary/web/http.rb by documenting the Request and Response helpers, the public HTTP request APIs, and the internal custom-404/request-handling flow.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21145">#21145</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - Adds YARD docs to lib/msf/core/auxiliary/auth_brute.rb, focusing on the AuthBrute mixin’s credential-building, brute-force state, logging, and cleanup helpers.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21150">#21150</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - Adds YARD documentation to lib/msf/core/payload/adapter/fetch.rb to improve consistency and clarify how the fetch adapter generates URIs, builds fetch commands, and resolves platform-specific execution behavior.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21194">#21194</a> from <a href="https://github.com/bcoles">bcoles</a> - This updates the post/linux/gather/enum_protections module by adding documentation and additional checks for modern protections and applications.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21214">#21214</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Adds additional validation to db_import before attempting to import values.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21048">#21048</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Not written - add release notes directly to the pull request, then regenerate. Do not edit manually without ensuring the pull request has the release note present.</li></ul><h2>Bugs fixed (6)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21004">#21004</a> from <a href="https://github.com/EclipseAditya">EclipseAditya</a> - This fixes a bug in the #normalize_key method provided by the Windows Registry mixin. The result is correct behavior when using shell sessions to check for keys with trailing \ characters.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21138">#21138</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Fixes a bug that stopped the auxiliary/server/dhcp module from running as a background job when RHOSTS had been set.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21188">#21188</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a crash on older Ruby versions when scanning binary files.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21199">#21199</a> from <a href="https://github.com/Hemang360">Hemang360</a> - Fixes crash in auxiliary/scanner/http/wp_perfect_survey_sqli when run against invalid or unreachable targets.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21207">#21207</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Fixes warning when running the linux/gather/enum_protections module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21208">#21208</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes multiple warnings in modules that reported notes incorrectly.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21073">#21073</a> from <a href="https://github.com/Hemang360">Hemang360</a> - Fixes a bug where running exploit/multi/handler with a reverse HTTP/HTTPS payload multiple times on the same port caused cleanup issues.</li></ul><h2>Documentation added (6)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21149">#21149</a> from <a href="https://github.com/Adithyadspawar">Adithyadspawar</a> - Adds documentation to the following login scanners: ftp/bison_ftp_traversal, http/apache_activemq_traversal, http/coldfusion_version, http/drupal_views_user_enum and http/elasticsearch_traversal.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21186">#21186</a> from <a href="https://github.com/Devansh7006">Devansh7006</a> - Adds documentation for the wordpress_pingback_access module.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21187">#21187</a> from <a href="https://github.com/Devansh7006">Devansh7006</a> - Updates documentation for auxiliary/scanner/http/http_put.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21200">#21200</a> from <a href="https://github.com/dineshg0pal">dineshg0pal</a> - Updates the example code snippet for writing Metasploit Go modules.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21201">#21201</a> from <a href="https://github.com/aryan9190">aryan9190</a> - Adds YARD documentation for Rex::Post::IO class.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21217">#21217</a> from <a href="https://github.com/dineshg0pal">dineshg0pal</a> - Fixes minor errors in documentation files.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-03-26T11%3A49%3A13Z..2026-04-02T10%3A24%3A13Z%22">Pull Requests 6.4.124...6.4.125</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.124...6.4.125">Full diff 6.4.124...6.4.125</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-04-03-2026</link>
      <guid isPermaLink="false">blt5f25f7ef5fc9cc1d</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Simon Janusz]]></dc:creator>
      <pubDate>Fri, 03 Apr 2026 19:06:10 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 03/27/2026]]></title>
      <description><![CDATA[<p></p><h2>Better NTLM Relaying Functionality</h2><p>This week’s release brings an improvement to the SMB NTLM relay server. In the past, it’s support has been expanded with modules for relaying to HTTP (ESC8), MSSQL and LDAP while still receiving connections over the humble SMB service. Prior to this release, clients required a key behavior in how they handled SMB’s STATUS_NETWORK_SESSION_EXPIRED error code, in order to relay a single authentication attempt to multiple targets. Most clients other than Window’s “net use” do not handle these errors and were thus incompatible with Metasploit SMB NTLM relaying capabilities. Now, when a single target is specified, Metasploit alters its relaying strategy to forward the Net-NTLM messages immediately, making it compatible with a broader range of clients including Linux’s smbclient. In addition, the client in RubySMB was updated to mimic the behaviour of “net use” allowing authentication attempts from RubySMB to be relayed to multiple targets successfully.</p><h2>New module content (3)</h2><h3>ESC/POS Printer Command Injector</h3><p>Author: FutileSkills</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20478">#20478</a> contributed by <a href="https://github.com/futileskills">futileskills</a></p><p>Path: admin/printer/escpos_tcp_command_injector</p><p>Description: Adds a new auxiliary module that exploits CVE-2026-23767, an unauthenticated ESC/POS command vulnerability in networked Epson-compatible printers. The vulnerability allows an attacker to send crafted commands over the network to inject custom ESC/POS print commands, which are used in various receipt printers.</p><h3>Eclipse Che machine-exec Unauthenticated RCE</h3><p>Authors: Greg Durys <a href="mailto:gregdurys.security@proton.me">gregdurys.security@proton.me</a> and Richard Leach</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20835">#20835</a> contributed by <a href="https://github.com/GregDurys">GregDurys</a></p><p>Path: linux/http/eclipse_che_machine_exec_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-12548&amp;referrer=blog">CVE-2025-12548</a></p><p>Description: This adds a module for CVE-2025-12548, an unauthenticated RCE in the Eclipse Che machine-exec service. The vulnerability allows attackers to connect over WebSocket on port 3333 and execute commands via JSON-RPC without authentication. This affects Red Hat OpenShift DevSpaces environments.</p><h3>Barracuda ESG TAR Filename Command Injection</h3><p>Authors: Curt Hyvarinen, Mandiant, and cfielding-r7</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21033">#21033</a> contributed by <a href="https://github.com/Alpenlol">Alpenlol</a></p><p>Path: linux/smtp/barracuda_esg_tarfile_rce AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2023-2868&amp;referrer=blog">CVE-2023-2868</a></p><p>Description: Adds exploit module for CVE-2023-2868, a command injection vulnerability in Barracuda Email Security Gateway (ESG) appliances. Filenames in TAR attachments are passed to shell commands without sanitization, allowing RCE via backtick injection.</p><h2>Enhancements and features (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21049">#21049</a> from <a href="https://github.com/h00die">h00die</a> - This updates post modules to use an API that will expand multiple environment variables when set within the WritableDir option.</li></ul><h2>Bugs fixed (5)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20967">#20967</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - This fix an issue that prevents successful authentication relay from Ruby SMB Client and smbclient. These clients are now compatible with Msf::Exploit::Remote::SMB::RelayServer.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21148">#21148</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a bug where setting VERBOSE logging as false globally would still cause verbose logging to occur.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21169">#21169</a> from <a href="https://github.com/SaiSakthidar">SaiSakthidar</a> - This fixes a bug that was preventing Mach-O binaries from being identified due to a Ruby string encoding compatibility problem.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21173">#21173</a> from <a href="https://github.com/msutovsky-r7">msutovsky-r7</a> - Fixes a crash when attempting to generate a vbs payload with msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.1 LPORT=44 -f vbs.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21174">#21174</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a bug when parsing msfconsole's -x flag when additional semicolons are present that are not meant to separate commands. i.e. msfconsole -x 'set option_name "a;b"'.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-03-18T23%3A56%3A12Z..2026-03-26T11%3A49%3A13Z%22">Pull Requests 6.4.123...6.4.124</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.123...6.4.124">Full diff 6.4.123...6.4.124</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-03-27-2026</link>
      <guid isPermaLink="false">blt65197b62038306df</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Fri, 27 Mar 2026 20:48:03 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 03/20/2026]]></title>
      <description><![CDATA[<h2>♫ I Just Called ♫ To Say ♫ 7f45 4c46 0201 0100 0000 0000 0000 0000 0300 3e00 0100♫</h2><p>This release contains 2 new exploit modules, 2 enhancements, and 7 bug fixes. Community contributor Chocapikk submitted both exploit modules this release: one targeting AVideo-Encoder’s getImage.php file and another targeting FreePBX. Leading the enhancements is a granularization for LDAP queries allowing the omission of SACL data on security descriptors, as without the proper permissions the entire query of the security descriptor will fail if the SACL data is even just a part of the query.</p><h2>New module content (2)</h2><h3>AVideo Encoder getImage.php Unauthenticated Command Injection</h3><p>Authors: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> and arkmarta</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21076">#21076</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: linux/http/avideo_encoder_getimage_cmd_injection</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-29058&amp;referrer=blog">CVE-2026-29058</a></p><p>Description: Adds an exploit module for CVE-2026-29058, an unauthenticated OS command injection in AVideo Encoder's getImage.php endpoint.</p><h3>FreePBX filestore authenticated command injection</h3><p>Authors: Cory Billington and Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a></p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20719">#20719</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: unix/http/freepbx_filestore_cmd_injection</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-64328&amp;referrer=blog">CVE-2025-64328</a></p><p>Description: Adds a new Metasploit exploit module for FreePBX filestore authenticated command injection (CVE-2025-64328) with automatic vulnerable-version detection and full documentation, and renames the XorcomCompletePbx HTTP mixin to CompletePBX updating affected modules accordingly.</p><h2>Enhancements and features (2)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20730">#20730</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - This update modifies the ldap_query module to skip querying the SACL (System Access Control List) on security descriptors by default. This behavior is now controlled by a new option, LDAP::QuerySacl. This change is necessary when using a non-privileged user to query security descriptors via LDAP; otherwise, querying the SACL will cause the entire query to be blocked, resulting in no security descriptors being returned.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20997">#20997</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - This adds a new OptTimedelta datastore option type. It enables module authors to specify a time duration and users to set it with a human-friendly syntax.</li></ul><h2>Bugs fixed (7)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20960">#20960</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This adds a DHCPINTERFACE option to the DHCP server mixin, allowing modules that start that server to specify a particular interface to bind to.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21020">#21020</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - This makes a small change to the docs by removing two lines that were previously duplicated.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21024">#21024</a> from <a href="https://github.com/Aaditya1273">Aaditya1273</a> - Fixes a bug in the JSON-RPC msfrpcd functionality that incorrectly required SSL certificates to be present even when disabled with msfrpcd -S.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21025">#21025</a> from <a href="https://github.com/Hemang360">Hemang360</a> - Fixes a crash when calling the HTTP cookie jar with non-string values.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21028">#21028</a> from <a href="https://github.com/SilentSobs">SilentSobs</a> - Fixes a crash when using the reload_all command no module is present.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21081">#21081</a> from <a href="https://github.com/Hemang360">Hemang360</a> - Fixes a crash when using the windows/exec with non-ascii characters.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/21139">#21139</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - This fixes a bug in the ldap_esc_vulnerable_cert_finder module that was preventing authentication from working when making a WinRM connection.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/21074">#21074</a> from <a href="https://github.com/jeanmtr">jeanmtr</a> - Adds documentation for the pop3_login module.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-03-10T20%3A31%3A01Z..2026-03-18T23%3A56%3A12Z%22">Pull Requests 6.4.122...6.4.123</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.122...6.4.123">Full diff 6.4.122...6.4.123</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-03-20-2026</link>
      <guid isPermaLink="false">blta81ede50bbdc2f0c</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Brendan Watters]]></dc:creator>
      <pubDate>Fri, 20 Mar 2026 20:03:54 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 03/13/2026]]></title>
      <description><![CDATA[<p></p><h2>No bad luck here: Friday the 13th brings new modules and a Metasploit Pro milestone</h2><p>This week’s Metasploit Framework release delivers three new modules across reconnaissance, evasion, and exploitation: LeakIX-powered discovery for exposed services and leaked data, a Linux x64 RC4 payload packer for more flexible evasive delivery, and an unauthenticated RCE module for SPIP Saisies (CVE-2025-71243). Alongside those additions, we shipped practical quality-of-life improvements including a smaller configurable bind_netcat payload path, and automatic WordPress service reporting in the WordPress mixin.</p><p>Finally, we’re also excited to share the new Metasploit Pro 5.0.0 release with an updated UI and SSO support amongst other changes, check out the announcement here: <a href="https://www.rapid7.com/blog/post/pt-announcing-metasploit-pro-5-penetration-testing-evolving/">Announcing Metasploit Pro 5: Penetration Testing, Evolving</a>.</p><h2>New module content (3)</h2><h3>LeakIX Search</h3><p>Authors: LeakIX <a href="mailto:support@leakix.net">support@leakix.net</a> and Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a></p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21002">#21002</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: gather/leakix_search</p><p>Description: Adds a new module auxiliary/gather/leakix_search, a new module for LeakIX API - a search engine focused on indexing internet-exposed services and leaked credentials/databases.</p><h3>Linux RC4 Encrypted Payload Generator</h3><p>Author: Massimo Bertocchi</p><p>Type: Evasion</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20966">#20966</a> contributed by <a href="https://github.com/litemars">litemars</a></p><p>Path: linux/x64/rc4_packer</p><p>Description: Adds a new module evasion/linux/x64/rc4_packer packer that encrypts the generated payload with RC4, prepends an optional sleep-based delay (nanosleep), and decrypts/executes the payload at runtime via a compact precompiled stub.</p><h3>SPIP Saisies Plugin Unauthenticated RCE</h3><p>Authors: OpenStudio and Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a></p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/21001">#21001</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a></p><p>Path: multi/http/spip_saisies_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-71243&amp;referrer=blog">CVE-2025-71243</a></p><p>Description: This adds a new module for CVE-2025-71243, an unauthenticated PHP code-injection vulnerability in the SPIP Saisies plugin. The injection takes place through _anciennes_valeurs, which allows an attacker to inject a PHP payload.</p><h2>Enhancements and features (2)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20885">#20885</a> from <a href="https://github.com/dledda-r7">dledda-r7</a> - Updates the bind_netcat payload to allow it to be smaller by selecting either default or BSD-style netcat command syntax. Previously, the payload ran both command syntaxes combined by an OR operator so wherever it was executed, the payload worked. The default behavior remains to run both, but in the event a user needs a significantly shorter payload, they can select a single netcat syntax and adjust the filenames.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20961">#20961</a> from <a href="https://github.com/Nayeraneru">Nayeraneru</a> - This adds service reporting to Wordpress mixin. Now, when you use a Wordpress module, it will automatically report the target as Wordpress if detected.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-03-05T14%3A49%3A28Z..2026-03-10T20%3A31%3A01Z%22">Pull Requests 6.4.119...6.4.122</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.119...6.4.122">Full diff 6.4.119...6.4.122</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-03-13-2026</link>
      <guid isPermaLink="false">blt0f4222ed13503dd7</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Dean Welch]]></dc:creator>
      <pubDate>Fri, 13 Mar 2026 19:06:41 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[The Face of Penetration Testing is Changing: Announcing Metasploit Pro 5.0.0]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The role and demand for red-teaming capabilities are growing, as more exploitable CVEs make their way into criminal hands. Being proactive is no longer a capability that can be reserved for annual tests, but a continuous assessment to determine exposure and even through the validation of an organization's security posture. With this in mind, we are delighted to announce the long awaited availability of </span><span style='font-size: undefined;'><strong>Metasploit Pro 5.0.0 </strong></span><span style='font-size: undefined;'>–</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>which is not just an update, but a fundamentally new approach to red-teaming, designed with the sole intention of staying ahead of ever-increasingly capable threat actors. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Amongst the multitude of changes, Metasploit 5.0.0 offers an intuitive testing workflow that removes the ever evolving complexity of testing, as well as a suite of powerful new modules and critical enhancements. This is the version you can't afford to miss. For all the technical details, the granular release notes can be viewed </span><a href="https://docs.rapid7.com/insight/release-notes-5.0.0-2026031101/" target="_blank"><span style='font-size: undefined;'>here</span></a><span style='font-size: undefined;'>.</span></p><h2><span style='font-size: undefined;'>So what’s new?</span></h2><h3><span style='font-size: undefined;'>Intuitive testing workflow</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Say goodbye to complexity, as Metasploit Pro has completely overhauled the testing workflow. Updates are highlighted by an intuitive user interface, ensuring that your focus remains on high-value penetration testing and vulnerability validation, not fighting the interface. These changes are the foundation for the future, preserving the core functionality you rely on while enabling even more powerful features down the road.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt797cdcb9951018d0/69b1f828c048556821e8504e/image2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image2.png" asset-alt="image2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt797cdcb9951018d0/69b1f828c048556821e8504e/image2.png" data-sys-asset-uid="blt797cdcb9951018d0" data-sys-asset-filename="image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image2.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Stop guessing and start seeing. The new implementation of Network Topology support provides instant, crystal-clear clarity on hosts that have been compromised, have associated cracked credentials, or captured data. For enterprise environments with vast, complex surfaces, we’ve invested in performance improvements, giving you the power to zoom and pan through hundreds of available hosts with zero lag. This is actionable visualization that transforms data into defense.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt30934816d54b0800/69b1f8281c794a12b43274c3/image6.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image6.png" asset-alt="image6.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt30934816d54b0800/69b1f8281c794a12b43274c3/image6.png" data-sys-asset-uid="blt30934816d54b0800" data-sys-asset-filename="image6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image6.png" sys-style-type="display"/></figure><p>⠀</p><h3><span style='font-size: undefined;'>Vulnerability detection improvements</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Get the necessary assurance before you click 'run.' Metasploit modules can now register crucial vulnerability detection details as part of running. This means that modules capable of running pre-check detection logic give you the full intelligence picture before you attempt exploitation. This new level of transparency and detail empowers you to make smarter, faster decisions, saving you precious time and minimizing the chance of failed module runs and adverse side effects.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltac4e677f7930cc86/69b1f8287e503c5240b2deb3/image4.png" height="671" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image4.png" asset-alt="image4.png" width="1223" max-width="1223" max-height="671" style="max-width: 1223px; width: 1223px; max-height: 671px; height: 671px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltac4e677f7930cc86/69b1f8287e503c5240b2deb3/image4.png" data-sys-asset-uid="bltac4e677f7930cc86" data-sys-asset-filename="image4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image4.png" sys-style-type="display"/></figure><p>⠀</p><h3><span style='font-size: undefined;'>Advanced workflow improvements</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Unleash your inner expert with unprecedented control and efficiency. Advanced users of Metasploit Pro will immediately benefit from multiple UX improvements to the single module run page. Tired of manually configuring options? Users now receive intelligent suggestions for applicable values, including network targets, Kerberos credential cache files, and more –  streamlining ADCS workflows.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltddbbe49d90e28bd9/69b1f8281bca047b72eaa789/image3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image3.png" asset-alt="image3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltddbbe49d90e28bd9/69b1f8281bca047b72eaa789/image3.png" data-sys-asset-uid="bltddbbe49d90e28bd9" data-sys-asset-filename="image3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image3.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Furthermore, you now have the ability to manually choose and configure individual payloads, giving you the final word on how you exploit targets. Metasploit Pro will continue to default to the most common payload for each exploit.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Plus, new quality-of-life improvements for replaying module runs ensure that verifying remediation and re-exploiting targets is a seamless, one-click process. Gone are the days of reconfiguring an entire module run to change a single option. The old list view has also been updated to include the ability to view the module option details that a module was run with. These capabilities can additionally be leveraged by advanced users who are interacting with Metasploit Pro in a programmatic fashion or through the command line interface to see exactly how Metasploit Pro is running modules.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta6c9debba40f4209/69b1f8283984d27906e0d8cf/image1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image1.png" asset-alt="image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta6c9debba40f4209/69b1f8283984d27906e0d8cf/image1.png" data-sys-asset-uid="blta6c9debba40f4209" data-sys-asset-filename="image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image1.png" sys-style-type="display"/></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Finally, boost your team's collaboration with the new session tagging feature. Sessions can now be tagged to facilitate advanced and coordinated post-exploitation workflows. Team members can apply instant, custom tags to track status and flag arbitrary qualities, which significantly improves coordination and organization across multi-person engagements.</span></p><h3><span style='font-size: undefined;'>AD CS exploitation</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Tackle one of the most critical attack vectors in modern networks: Metasploit continues its relentless investment in modern exploitation techniques with the groundbreaking updates to the AD CS Workflows Metamodule. This powerful new feature is a significant advancement, providing security professionals with an automated, comprehensive approach to identifying and leveraging nine common AD CS vulnerabilities. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Now we’ve taken it even further, with new support for the latest and most dangerous ESC flaws: ESC9, ESC10, and ESC16. Take back control of your Active Directory environment and neutralize these threats with surgical precision. For detailed configuration instructions and comprehensive feature documentation, visit our </span><a href="https://docs.rapid7.com/metasploit/ad-cs-workflows-metamodule/" target="_blank"><span style='font-size: undefined;'>AD CS Workflows MetaModule documentation</span></a><span style='font-size: undefined;'>.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte16d0dba44c36619/69b1f82950b0701a323c5763/image5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image5.png" asset-alt="image5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte16d0dba44c36619/69b1f82950b0701a323c5763/image5.png" data-sys-asset-uid="blte16d0dba44c36619" data-sys-asset-filename="image5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image5.png" sys-style-type="display"/></figure><p>⠀</p><h3><span style='font-size: undefined;'>Session tags</span></h3><p><span style='font-size: undefined;'>In fast-moving operations, context can disappear quickly as new sessions come online and analysts shift between tasks. Session tagging brings clarity back to your workflow by letting you attach meaningful labels to every open session. Instead of relying on IPs or hostnames alone, you can tag sessions with identifiers that matter to your team - such as priority, environment, or role - making it easy to group related systems and instantly recognize high-value targets.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7d90d5bf859fd024/69b2b59843279d768e1b1bd5/Metasploit-pro-5-session-tagging.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Metasploit-pro-5-session-tagging.png" asset-alt="Metasploit-pro-5-session-tagging.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7d90d5bf859fd024/69b2b59843279d768e1b1bd5/Metasploit-pro-5-session-tagging.png" data-sys-asset-uid="blt7d90d5bf859fd024" data-sys-asset-filename="Metasploit-pro-5-session-tagging.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Metasploit-pro-5-session-tagging.png" sys-style-type="display"/></figure><p>⠀</p><h3><span style='font-size: undefined;'>SAML Single Sign On</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Metasploit Pro now incorporates SAML Single Sign-On (SSO) authentication, providing your team with a simple, unified login experience. By connecting to your centralized directory, users can access Metasploit Pro with the same credentials they use for all other major applications. Administrators can easily configure their identity provider (IDP) to enable a passwordless workflow and utilize existing Multi-Factor Authentication (MFA) services, making access quick, consistent, and part of your standard corporate flow.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>These features are available in Metasploit Pro 5.0.0 onwards. We’re also proud to collaborate with our customers, who are often the source of inspiration for product evolution. Ideas for improvements or enhancements can be shared with our Support team to help you refine the idea, then submit it to our Product team on your behalf.</span></p><h2><span style='font-size: undefined;'>Related viewing</span></h2><p><span style='font-size: undefined;'>Rapid7 Labs launched a podcast today! Episode 1 of 'Hacktics & Telemetry' is now live on </span><a href="https://www.youtube.com/@OfficialRapid7" target="_blank"><span style='font-size: undefined;'>Rapid7's YouTube page</span></a><span style='font-size: undefined;'>. Alongside some expert commentary on emergent threats and an exciting guest spot, the final segment is all about Metasploit Pro 5.0.0. Dive into our </span><a href="https://www.rapid7.com/blog/post/pt-announcing-metasploit-pro-5-penetration-testing-evolving" target="_blank"><span style='font-size: undefined;'>official companion blog here,</span></a> and find the full episode embedded below.</p><p>⠀</p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-announcing-metasploit-pro-5-penetration-testing-evolving</link>
      <guid isPermaLink="false">blte34c288cd4f97ffb</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Penetration Testing]]></category><dc:creator><![CDATA[The Metasploit Team]]></dc:creator>
      <pubDate>Thu, 12 Mar 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd300e09a53b20145/6846a7112fcbadab2a662455/metasploit-weekly.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 03/06/2026]]></title>
      <description><![CDATA[<p></p><h1 style="direction: ltr;">Encoder exposed!</h1><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Some of our releases add new ways in; this one adds new ways to stay in.   There are, of course, still new RCE toys in the box (Tactical RMM via Jinja2 SSTI and an unauthenticated MajorDoMo exploit). Still, the underlying theme is payloads: more control over how they are packaged and delivered, and fewer "why did it die instantly?" moments. We, like our community of module authors, grew tired of having to do everything by hand. You can now pick encoders (and tweak their options) directly for exploit and payload modules without extra glue code. Less plumbing, more choosing-the-right-badchar-killer-at-runtime.</span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1b9cf1dad7cd02c5/69ab1cbdeed4c20008b3a2b2/2026-03-06-meme.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="2026-03-06-meme.png" asset-alt="2026-03-06-meme.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1b9cf1dad7cd02c5/69ab1cbdeed4c20008b3a2b2/2026-03-06-meme.png" data-sys-asset-uid="blt1b9cf1dad7cd02c5" data-sys-asset-filename="2026-03-06-meme.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="2026-03-06-meme.png" sys-style-type="display"/></figure><p></p><h2 style="direction: ltr;">New module content (3)</h2><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Linux RC4 Packer with In-Memory Execution (x86)</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: Massimo Bertocchi</span></p><p><span style='font-size: undefined;'>Type: Evasion</span></p><p><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20965"><span style='font-size: undefined;'>#20965</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/litemars"><span style='font-size: undefined;'>litemars</span></a></p><p><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/x86/rc4_packer</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: Adds a new module </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>evasion/linux/x86/rc4_packer</span><span style='font-size: undefined;'> that encrypts the generated payload with RC4, prepends an optional sleep-based delay (nanosleep), and decrypts/executes the payload at runtime via a compact precompiled stub.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Tactical RMM Jinja2 SSTI Remote Code Execution</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Authors: Gabriel Gomes and Valentin Lobstein </span><a href="mailto:chocapikk@leakix.net"><span style='font-size: undefined;'>chocapikk@leakix.net</span></a></p><p><span style='font-size: undefined;'>Type: Exploit</span></p><p><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/21017"><span style='font-size: undefined;'>#21017</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/Chocapikk"><span style='font-size: undefined;'>Chocapikk</span></a></p><p><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/http/tacticalrmm_ssti_rce_cve_2025_69516</span></p><p><span style='font-size: undefined;'>AttackerKB reference: </span><a href="https://attackerkb.com/search?q=CVE-2025-69516&amp;referrer=blog"><span style='font-size: undefined;'>CVE-2025-69516</span></a></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: This adds an exploit module for CVE-2025-69516, a Jinja2 SSTI in Tactical RMM &lt; 1.4.0 where the reporting template preview endpoint evaluates user-controlled templates without sandboxing, enabling authenticated RCE. The module logs in via the Knox API, auto-detects the API host from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>/env-config.js</span><span style='font-size: undefined;'>, and exploits the template preview feature.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>MajorDoMo Remote Command Injection via cycle_execs Race Condition</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: Valentin Lobstein </span><a href="mailto:chocapikk@leakix.net"><span style='font-size: undefined;'>chocapikk@leakix.net</span></a></p><p><span style='font-size: undefined;'>Type: Exploit</span></p><p><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/21000"><span style='font-size: undefined;'>#21000</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/Chocapikk"><span style='font-size: undefined;'>Chocapikk</span></a></p><p><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>multi/http/majordomo_cmd_injection_rce</span></p><p><span style='font-size: undefined;'>AttackerKB reference: </span><a href="https://attackerkb.com/search?q=CVE-2026-27175&amp;referrer=blog"><span style='font-size: undefined;'>CVE-2026-27175</span></a></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: Adds three exploit modules for MajorDoMo, an open-source home automation platform. All three vulnerabilities are unauthenticated.</span></p><h2 style="direction: ltr;">Enhancements and features (2)</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20852"><span style='font-size: undefined;'>#20852</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/dledda-r7"><span style='font-size: undefined;'>dledda-r7</span></a><span style='font-size: undefined;'> - This adds encoder options for exploit and payload modules. It allows the user to select the encoder and modify its options when using exploit or payload without the need of adding additional code into the module.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20987"><span style='font-size: undefined;'>#20987</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/sjanusz-r7"><span style='font-size: undefined;'>sjanusz-r7</span></a><span style='font-size: undefined;'> - Allows AS-REP and Kerberoast modules to be ran against a pre-existing LDAP session as well as RHOST values.</span></p></li></ul><h2 style="direction: ltr;">Bugs fixed (5)</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20740"><span style='font-size: undefined;'>#20740</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/Chocapikk"><span style='font-size: undefined;'>Chocapikk</span></a><span style='font-size: undefined;'> - This adds a new </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>SRVSSL</span><span style='font-size: undefined;'> option to the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>HttpServer</span><span style='font-size: undefined;'> library, allowing SSL to be enabled for the HTTP server independently from the HTTP client.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20830"><span style='font-size: undefined;'>#20830</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/SilentSobs"><span style='font-size: undefined;'>SilentSobs</span></a><span style='font-size: undefined;'> - This fixes a portability issue in </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>Msf::Post::File.stat</span><span style='font-size: undefined;'> where the code incorrectly assumed a GNU </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>stat</span><span style='font-size: undefined;'> output format.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20940"><span style='font-size: undefined;'>#20940</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/g0tmi1k"><span style='font-size: undefined;'>g0tmi1k</span></a><span style='font-size: undefined;'> - Fixes an issue where the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>&gt;</span><span style='font-size: undefined;'> (file Redirect operator) causes the exploit to fail.  This updates the exploit to use </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>tee</span><span style='font-size: undefined;'> to avoid that problematic operator and also increases debug verbosity, simplifies code, adds documentation, and adds support for fetch payloads to gain Linux Meterpreter sessions.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20946"><span style='font-size: undefined;'>#20946</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/g0tmi1k"><span style='font-size: undefined;'>g0tmi1k</span></a><span style='font-size: undefined;'> - Corrects issue where the revision value provided in the http requests can be  outside the subset of revision id/value/numbers; a revision value that is not an actual revision value may result in a failed exploit.  Also, cleaned up logic and increased debugging verbosity.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/21044"><span style='font-size: undefined;'>#21044</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/adfoster-r7"><span style='font-size: undefined;'>adfoster-r7</span></a><span style='font-size: undefined;'> - Fixes a crash when using </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>db_import</span><span style='font-size: undefined;'> on a nessus with protocols other than </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>tcp</span><span style='font-size: undefined;'> or </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>udp</span><span style='font-size: undefined;'>.</span></p></li></ul><h2 style="direction: ltr;">Documentation</h2><p style="direction: ltr;"><span style='font-size: undefined;'>You can find the latest Metasploit documentation on our docsite at </span><a href="https://docs.metasploit.com/"><span style='font-size: undefined;'>docs.metasploit.com</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Get it</h2><p style="direction: ltr;"><span style='font-size: undefined;'>As always, you can update to the latest Metasploit Framework with </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>msfupdate</span><span style='font-size: undefined;'> and you can get more details on the changes since the last blog post from GitHub:</span></p><p></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-02-26T16%3A14%3A35%2B01%3A00..2026-03-05T14%3A49%3A28Z%22"><span style='font-size: undefined;'>Pull Requests 6.4.116...6.4.119</span></a></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.116...6.4.119"><span style='font-size: undefined;'>Full diff 6.4.116...6.4.119</span></a></p></li></ul><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>If you are a </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>git</span><span style='font-size: undefined;'> user, you can clone the </span><a href="https://github.com/rapid7/metasploit-framework"><span style='font-size: undefined;'>Metasploit Framework repo</span></a><span style='font-size: undefined;'> (master branch) for the latest. To install fresh without using git, you can use the open-source-only </span><a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers"><span style='font-size: undefined;'>Nightly Installers</span></a><span style='font-size: undefined;'> or the commercial edition </span><a href="https://www.rapid7.com/products/metasploit/download/"><span style='font-size: undefined;'>Metasploit Pro</span></a></p><p></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-03-06-2026</link>
      <guid isPermaLink="false">blt8fe413aa9d88b776</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Martin Sutovsky]]></dc:creator>
      <pubDate>Fri, 06 Mar 2026 18:28:41 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 02/27/2026]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">No Prob-ollama</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This release brings some serious firepower with multiple new exploit modules and critical vulnerability support! The standout additions are the Ollama path traversal RCE (CVE-2024-37032), a sophisticated exploit chaining arbitrary file writes into unauthenticated root RCE, and the Grandstream GXP1600 stack overflow (CVE-2026-2329), which targets VoIP devices with accompanying credential harvesting and SIP interception post-modules. </span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>The BeyondTrust PRA/RS module got upgraded with support for the new CVE-2026-1731 command injection vulnerability along with legacy CVE support. On the evasion front, there's fresh ARM64 RC4 encryption support with sleep-based detection bypass. Classic vulnerability modules like Unreal IRCd and vsftpd backdoors got quality-of-life improvements with proper check methods and multiple exploitation targets. Several auxiliary scanners (LDAP ESC, GraphQL introspection) also received critical bugfix updates eliminating false positives and crashes.</span></p><p></p><h2 style="direction: ltr;">New module content (7)</h2><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Linux RC4 Packer with In-Memory Execution</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: Massimo Bertocchi</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Evasion</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20964"><span style='font-size: undefined;'>#20964</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/litemars"><span style='font-size: undefined;'>litemars</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/aarch64/rc4_packer</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: First Linux evasion module for arm64, a packer using rc4 encryption, in memory execution of the elf binary, and sleep evasion.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) unauthenticated Remote Code Execution</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Authors: Harsh Jaiswal and Jonah Burgess (CryptoCat)</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Exploit</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20978"><span style='font-size: undefined;'>#20978</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/jburgess-r7"><span style='font-size: undefined;'>jburgess-r7</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/http/beyondtrust_pra_rs_command_injection</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>AttackerKB reference: </span><a href="https://attackerkb.com/search?q=CVE-2026-1731&amp;referrer=blog"><span style='font-size: undefined;'>CVE-2026-1731</span></a></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: This adds a new module for unauthenticated command injection in BeyondTrust PRA/RS (CVE-2026-1731). This change also introduces a new library for BeyondTrust familiar helper functions; existing modules have been ported to use it.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>GrandStream GXP1600 Unauthenticated Remote Code Execution</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: sfewer-r7</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Exploit</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20983"><span style='font-size: undefined;'>#20983</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/sfewer-r7"><span style='font-size: undefined;'>sfewer-r7</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/http/grandstream_gxp1600_unauth_rce</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>AttackerKB reference: </span><a href="https://attackerkb.com/search?q=CVE-2026-2329&amp;referrer=blog"><span style='font-size: undefined;'>CVE-2026-2329</span></a></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: Adds three new modules: one exploit and two post modules, all targeting the Grandstream GXP1600 series of VoIP devices.  The exploit module uses CVE-2026-2329 to gain a root session, and the post modules leverage that access to perform credential stealing and packet capture.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Ollama Model Registry Path Traversal RCE</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Authors: Sagi Tzadik </span><a href="mailto:sagitz@wiz.io"><span style='font-size: undefined;'>sagitz@wiz.io</span></a><span style='font-size: undefined;'> and Valentin Lobstein </span><a href="mailto:chocapikk@leakix.net"><span style='font-size: undefined;'>chocapikk@leakix.net</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Exploit</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/21006"><span style='font-size: undefined;'>#21006</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/Chocapikk"><span style='font-size: undefined;'>Chocapikk</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/http/ollama_rce_cve_2024_37032</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>AttackerKB reference: </span><a href="https://attackerkb.com/search?q=CVE-2024-37032&amp;referrer=blog"><span style='font-size: undefined;'>CVE-2024-37032</span></a></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: This adds a new exploit module for Ollama (CVE-2024-37032). Ollama's pull mechanism accepts arbitrary path traversal sequences, allowing an attacker to load a rogue OCI registry and write arbitrary files. The exploit does this by writing </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>.so</span><span style='font-size: undefined;'> files into the target, then forcing Ollama to spawn a new process where the malicious library is loaded.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Linux WSL via Startup Folder Persistence</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: h00die</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Exploit</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20819"><span style='font-size: undefined;'>#20819</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/h00die"><span style='font-size: undefined;'>h00die</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/persistence/wsl/startup_folder</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: This adds a new persistence module for WSL that writes a payload to the user's startup folder. The module creates a persistence for Windows; however, the initial access needs to be in Linux.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Windows Registry Active Setup Persistence</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: h00die</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Exploit</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20841"><span style='font-size: undefined;'>#20841</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/h00die"><span style='font-size: undefined;'>h00die</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>windows/persistence/registry_active_setup</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: This adds new persistence for Windows, which uses the Windows feature Active Setup. The module abuse is used to launch our payload, with 2 caveats. 1) You downgrade from admin to user permissions, 2) it only launches the payload once per user.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>GrandStream GXP1600 proxy SIP traffic</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Author: sfewer-r7</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Type: Post</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Pull request: </span><a href="https://github.com/rapid7/metasploit-framework/pull/20983"><span style='font-size: undefined;'>#20983</span></a><span style='font-size: undefined;'> contributed by </span><a href="https://github.com/sfewer-r7"><span style='font-size: undefined;'>sfewer-r7</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>Path: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>linux/capture/grandstream_gxp1600_sip</span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>Description: Adds three new modules: one exploit and two post modules, all targeting the Grandstream GXP1600 series of VoIP devices.  The exploit module uses CVE-2026-2329 to gain a root session, and the post modules leverage that access to perform credential stealing and packet capture.</span></p><h2 style="direction: ltr;">Enhancements and features (9)</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20859"><span style='font-size: undefined;'>#20859</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/dledda-r7"><span style='font-size: undefined;'>dledda-r7</span></a><span style='font-size: undefined;'> - Splits the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>exe.rb</span><span style='font-size: undefined;'> into separate, more consistent files. Each file responds to a combination of platform and architecture, offering a better granular approach.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20938"><span style='font-size: undefined;'>#20938</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/Chocapikk"><span style='font-size: undefined;'>Chocapikk</span></a><span style='font-size: undefined;'> - Improves the check method in the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>beyondtrust_pra_rs_unauth_rrce</span><span style='font-size: undefined;'> to properly detect older versions that are also vulnerable but report the version in a different way.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20950"><span style='font-size: undefined;'>#20950</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/g0tmi1k"><span style='font-size: undefined;'>g0tmi1k</span></a><span style='font-size: undefined;'> - </span>Updates the vsftp_234_backdoor module to add shell and Meterpreter payloads, improves vulnerability detection, and improves the output for better troubleshooting.</p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20951"><span style='font-size: undefined;'>#20951</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/g0tmi1k"><span style='font-size: undefined;'>g0tmi1k</span></a><span style='font-size: undefined;'> - Moves default payload into </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>DefaultOptions</span><span style='font-size: undefined;'> in Remote for Mac module. This makes it more consistent with other existing modules.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20952"><span style='font-size: undefined;'>#20952</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/g0tmi1k"><span style='font-size: undefined;'>g0tmi1k</span></a><span style='font-size: undefined;'> - Enhances the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>unix/irc/unreal_ircd_3281_backdoor</span><span style='font-size: undefined;'> module to increase payload options, including adding a native Meterpreter session, adds debugging logic inside the module, and more verbose output.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20988"><span style='font-size: undefined;'>#20988</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/adfoster-r7"><span style='font-size: undefined;'>adfoster-r7</span></a><span style='font-size: undefined;'> - Improved SolarWinds exploit module to automatically pick the correct SRVHOST value.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20992"><span style='font-size: undefined;'>#20992</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/adfoster-r7"><span style='font-size: undefined;'>adfoster-r7</span></a><span style='font-size: undefined;'> - Adds a check method to the ms17-010 scanner module to improve the metadata associated with automation workflows.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/21010"><span style='font-size: undefined;'>#21010</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/Nayeraneru"><span style='font-size: undefined;'>Nayeraneru</span></a><span style='font-size: undefined;'> - </span><span style='color:rgb(31, 35, 40);font-size: undefined;'>This adds reporting for GitLab services.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/21014"><span style='font-size: undefined;'>#21014</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/adfoster-r7"><span style='font-size: undefined;'>adfoster-r7</span></a><span style='font-size: undefined;'> - Fixes a crash when running the ldap esc vulnerable cert finder against a target when LDAP binding fails.</span></p></li></ul><h2 style="direction: ltr;">Bugs fixed (1)</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/21012"><span style='font-size: undefined;'>#21012</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/adfoster-r7"><span style='font-size: undefined;'>adfoster-r7</span></a><span style='font-size: undefined;'> - Improves the GraphQL Introspection Scanner module to correctly handle invalid responses and false positives.</span></p></li></ul><h2 style="direction: ltr;">Documentation added (3)</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20832"><span style='font-size: undefined;'>#20832</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/DataExplorerX"><span style='font-size: undefined;'>DataExplorerX</span></a><span style='font-size: undefined;'> - Adds comprehensive documentation for the linux/samba/chain_reply module targeting CVE-2010-2063.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/20990"><span style='font-size: undefined;'>#20990</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/jheysel-r7"><span style='font-size: undefined;'>jheysel-r7</span></a><span style='font-size: undefined;'> - This adds and an AI Usage Policy to GSoC Ideas Page as requested by GSoC.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pull/21005"><span style='font-size: undefined;'>#21005</span></a><span style='font-size: undefined;'> from </span><a href="https://github.com/h00die"><span style='font-size: undefined;'>h00die</span></a><span style='font-size: undefined;'> - This adds example of GNU inetutils auth bypass module against a Synology NAS to existing documentation.</span></p></li></ul><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>You can always find more documentation on our docsite at </span><a href="https://docs.metasploit.com/"><span style='font-size: undefined;'>docs.metasploit.com</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Get it</h2><p style="direction: ltr;"><span style='font-size: undefined;'>As always, you can update to the latest Metasploit Framework with </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>msfupdate</span><span style='font-size: undefined;'> and you can get more details on the changes since the last blog post from GitHub:</span></p><p></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-02-19T09%3A16%3A01Z..2026-02-26T16%3A14%3A35%2B01%3A00%22"><span style='font-size: undefined;'>Pull Requests 6.4.115...6.4.116</span></a></p></li><li style="direction: ltr;"><p style="direction: ltr;"><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.115...6.4.116"><span style='font-size: undefined;'>Full diff 6.4.115...6.4.116</span></a></p></li></ul><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>If you are a </span><span style='color:rgb(24, 128, 56);font-size: undefined;'>git</span><span style='font-size: undefined;'> user, you can clone the </span><a href="https://github.com/rapid7/metasploit-framework"><span style='font-size: undefined;'>Metasploit Framework repo</span></a><span style='font-size: undefined;'> (master branch) for the latest. To install fresh without using git, you can use the open-source-only </span><a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers"><span style='font-size: undefined;'>Nightly Installers</span></a><span style='font-size: undefined;'> or the commercial edition </span><a href="https://www.rapid7.com/products/metasploit/download/"><span style='font-size: undefined;'>Metasploit Pro</span></a></p><p></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-02-27-2026</link>
      <guid isPermaLink="false">blt25d73849a65132a8</guid>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category>
      <category><![CDATA[Metasploit]]></category><dc:creator><![CDATA[Jacquie Harris]]></dc:creator>
      <pubDate>Fri, 27 Feb 2026 20:25:50 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 02/20/2026]]></title>
      <description><![CDATA[<p></p><h2>Hacking Churches and Backdooring Emacs</h2><p>This release packs some solid exploit module additions! Two new unauthenticated RCE modules are a major win: the <strong>StoryChief WordPress plugin exploit</strong> (CVE-2025-7441) targets a webhook validation flaw allowing arbitrary file uploads, while the <strong>ChurchCRM exploit</strong> (CVE-2025-62521) abuses the installation wizard to inject PHP code for persistent access. Both establish Meterpreter sessions. On the persistence front, there's a creative <strong>Emacs extension module</strong> that plants malicious Lisp code for shell callbacks whenever Emacs launches; a fun take on an unconventional attack surface. Along with Emacs, a new Windows persistence using the old, gold registry; this time the UserInit one, to get Administrator shells when any user logs in. To wrap-up, now you can spread automation nightmares with the new n8n auxiliary module, allowing you to extract sessions of other logged users (even admins).</p><h2>New module content (5)</h2><h3>n8n arbitrary file read</h3><p>Authors: dor attias and msutovsky-r7</p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20856">#20856</a> contributed by <a href="https://github.com/msutovsky-r7">msutovsky-r7</a></p><p>Path: gather/ni8mare_cve_2026_21858</p><p>Description: This adds an exploit module for n8n. The vulnerability, known as Ni8mare, allows arbitrary file read and session extraction of other users allowing privilege escalation on the WebApp context.</p><h3>Emacs Extension Persistence</h3><p>Author: h00die</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20919">#20919</a> contributed by <a href="https://github.com/h00die">h00die</a></p><p>Path: linux/persistence/emacs_extension</p><p>Description: This adds a persistence module compatible with emacs for Linux, the emacs extension will trigger a session creation as the compromised user.</p><h3>ChurchCRM Unauthenticated RCE 6.8.0</h3><p>Author: LucasCsmt</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20947">#20947</a> contributed by <a href="https://github.com/LucasCsmt">LucasCsmt</a></p><p>Path: multi/http/churchcrm_install_unauth_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-62521&amp;referrer=blog">CVE-2025-62521</a></p><p>Description: This PR adds a new exploit module for CVE-2025-62521, targeting an unauthenticated Remote Code Execution (RCE) vulnerability in ChurchCRM versions 6.8.0 and earlier.</p><h3>WordPress StoryChief Plugin Unauthenticated RCE</h3><p>Authors: Nayera and xpl0dec</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20976">#20976</a> contributed by <a href="https://github.com/Nayeraneru">Nayeraneru</a></p><p>Path: multi/http/wp_plugin_story_chef_file_upload</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-7441&amp;referrer=blog">CVE-2025-7441</a></p><p>Description: Adds a new exploit module targeting CVE-2025-7441, an unauthenticated RCE in the WordPress plugin StoryChief versions &lt;= 1.0.45.</p><h3>Windows Registry Persistence via Userinit</h3><p>Authors: h00die and joel</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20844">#20844</a> contributed by <a href="https://github.com/6a6f656c">6a6f656c</a></p><p>Path: windows/persistence/registry_userinit</p><p>Description: This adds a persistence module for Windows. Using the UserInit registry key the target machine will create a session with Admin privileges every time any user logs in.</p><h2>Enhancements and features (2)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20807">#20807</a> from <a href="https://github.com/webbsssss">webbsssss</a> - Allow Acunetix vulnerabilities to be imported without complete web page data.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20969">#20969</a> from <a href="https://github.com/sjanusz-r7">sjanusz-r7</a> - Updates Metasploit's logic when importing Acunetix XML files to now also include items that are less than High severity.</li></ul><h2>Bugs fixed (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20972">#20972</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes false positives on lg simple editor check methods.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-02-13T12%3A01%3A15Z..2026-02-19T09%3A16%3A01Z%22">Pull Requests 6.4.114...6.4.115</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.114...6.4.115">Full diff 6.4.114...6.4.115</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-02-20-2026</link>
      <guid isPermaLink="false">blt21980e3b5eeb06e4</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Diego Ledda]]></dc:creator>
      <pubDate>Fri, 20 Feb 2026 22:00:06 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 02/13/2026]]></title>
      <description><![CDATA[<h2>SolarWinds Web Help Desk</h2><p>Our very own <a href="https://github.com/sfewer-r7">sfewer-r7</a> has developed an exploit module for the SolarWinds Web Help Desk vulnerabilities CVE-2025-40536 and CVE-2025-40551. On successful exploitation the session will be as running as NT AUTHORITY\SYSTEM. For more information see the Rapid7’s <a href="https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/">SolarWinds Web Help Desk Vulnerabilities guidance</a>.</p><h2>Contributions</h2><p>A big thanks to our contributors who have been adding some great content this release. <a href="https://github.com/rudraditya21">rudraditya21</a> has added MITRE ATT&CK metadata to lots of our existing modules. <a href="https://github.com/Chocapikk">Chocapikk</a> has added support for GHSA (GitHub Security Advisory) references support in Metasploit modules. <a href="https://github.com/rudraditya21">rudraditya21</a> also added a change which adds negative caching to the LDAP entry cache, which will now mean missing objects are recorded. It also introduces a missing-entry sentinel, tracks misses per identifier type, and updates AD lookup helpers to short‑circuit on cached misses and record misses when a lookup returns no entry.</p><h2>New module content (5)</h2><h3>FreeBSD rtsold/rtsol DNSSL Command Injection</h3><p>Authors: Kevin Day and Lukas Johannes Möller</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20798">#20798</a> contributed by <a href="https://github.com/JohannesLks">JohannesLks</a></p><p>Path: freebsd/misc/rtsold_dnssl_cmdinject</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-14558&amp;referrer=blog">CVE-2025-14558</a></p><p>Description: This adds a new command-injection exploit in the FreeBDS rtsol/rtsold daemons (CVE-2025-14558). The vulnerability can be triggered by the Domain Name Search List (DNSSL) option in IPv6 Router Advertisement (RA) messages, which is passed to the resolvconf script without sanitization. It requires elevated privilege as it needs to send IPv6 packets. The injected commands are executed as root.</p><h3>Ivanti Endpoint Manager Mobile (EPMM) unauthenticated RCE</h3><p>Authors: sfewer-r7 and watchTowr</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20932">#20932</a> contributed by <a href="https://github.com/sfewer-r7">sfewer-r7</a></p><p>Path: linux/http/ivanti_epmm_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-1340&amp;referrer=blog">CVE-2026-1340</a></p><p>Description: Adds an exploit module for the recent command injection vulnerability, CVE-2026-1281, affecting Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron. Exploited in-the-wild as a zero-day by an unknown threat actor.</p><h3>GNU Inetutils Telnet Authentication Bypass Exploit CVE-2026-24061</h3><p>Authors: Kyu Neushwaistein and jheysel-r7</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20929">#20929</a> contributed by <a href="https://github.com/jheysel-r7">jheysel-r7</a></p><p>Path: linux/telnet/gnu_inetutils_auth_bypass</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2026-24061&amp;referrer=blog">CVE-2026-24061</a></p><p>Description: This adds an exploit module for the authentication bypass in GNU Inetutils telnetd tracked as CVE-2026-24061. During negotiation, if the USER environment variable is passed in with a value of "-f root" authentication can be bypassed resulting in command execution as the root user.</p><h3>SolarWinds Web Help Desk unauthenticated RCE</h3><p>Authors: Jimi Sebree and sfewer-r7</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20917">#20917</a> contributed by <a href="https://github.com/sfewer-r7">sfewer-r7</a></p><p>Path: multi/http/solarwinds_webhelpdesk_rce</p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-40551&amp;referrer=blog">CVE-2025-40551</a></p><p>Description: This adds an exploit module for SolarWinds Web Help Desk vulnerable to CVE-2025-40536 and CVE-2025-40551. The exploit triggers session opening as NT AUTHORITY\SYSTEM and root.</p><h3>Xerte Online Toolkits Arbitrary File Upload - Upload Image</h3><p>Author: Brandon Lester</p><p>Type: Exploit</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20849">#20849</a> contributed by <a href="https://github.com/haicenhacks">haicenhacks</a></p><p>Path: multi/http/xerte_authenticated_rce_uploadimage</p><p>Description: This adds three RCE modules for Xerte Online Toolkits affecting versions 3.14.0 and &lt;= 3.13.7. Two are unauthenticated while one is authenticated.</p><h2>Enhancements and features (10)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20710">#20710</a> from <a href="https://github.com/Chocapikk">Chocapikk</a> - Adds support for GHSA (GitHub Security Advisory) and OSV (Open Source Vulnerabilities) references in Metasploit modules.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20886">#20886</a> from <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> - Updates services to now also have child services. This allows for more detailed reporting for the services and vulns commands which can now report parent -&gt; child services e.g. SSL -&gt; HTTPS.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20895">#20895</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - Adds negative caching to the LDAP entry cache so missing objects are recorded and subsequent lookups by DN, sAMAccountName, or SID return nil without re-querying the directory.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20934">#20934</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - This adds MITRE ATT&CK tags to modules related to LDAP and AD CS. This enables users to find this content using Metasploit's search functionality and the att&ck keyword.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20935">#20935</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - Adds the MITRE ATT&CK tag T1558.003 to the kerberoast modules. This enables users to find this content using Metasploit's search functionality and the att&ck keyword.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20936">#20936</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - This adds MITRE ATT&CK tags to SMB modules related to accounts. This enables users to find the content by using Metasploit's search capability and the att&ck keyword.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20937">#20937</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - This adds MITRE ATT&CK tags to the two existing SCCM modules that fetch NAA credentials using different techniques. This enables users to find this content using Metasploit's search functionality and the att&ck keyword.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20941">#20941</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - Adds a MITRE ATT&CK technique reference to the Windows password cracking module to support ATT&CK‑driven discovery.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20942">#20942</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - Adds MITRE ATT&CK technique references to getsystem, cve_2020_1472_zerologon, and atlassian_confluence_rce_cve_2023_22527 modules to support ATT&CK‑driven discovery.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20943">#20943</a> from <a href="https://github.com/g0tmi1k">g0tmi1k</a> - Adds affected versions the description in the ‎exploits/unix/webapp/twiki_maketext module.</li></ul><h2>Bugs fixed (7)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20599">#20599</a> from <a href="https://github.com/BenoitDePaoli">BenoitDePaoli</a> - Fixes an issue where running services -p &lt;ports&gt; -u -R to set RHOSTS with values from the database could lead to a silently failing file not found error.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20775">#20775</a> from <a href="https://github.com/rmtsixq">rmtsixq</a> - Fixes a database initialization failure when using msfdb init with the --connection-string option to connect to PostgreSQL 15+ instances (e.g., Docker containers).</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20817">#20817</a> from <a href="https://github.com/randomstr1ng">randomstr1ng</a> - Adds a fix to ensure the output of sap_router_portscanner no longer causes module crashes.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20903">#20903</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - Fixes an issue so #enum_user_directories no longer returns duplicate directories.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20906">#20906</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - Implements a fix for SSH command shells dying on cmd_exec when a trailing newline was present.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20953">#20953</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Improves the stability of socket channeling support for SSH sessions opened via scanner/ssh/ssh_login.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20955">#20955</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Ensures the cleanup of temporarily created RHOST files when using the services -p &lt;ports&gt; -u -R command to set RHOST values from the database.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-02-04T14%3A20%3A14-05%3A00..2026-02-13T12%3A01%3A15Z%22">Pull Requests 6.4.112...6.4.114</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.112...6.4.114">Full diff 6.4.112...6.4.114</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-02-13-2026</link>
      <guid isPermaLink="false">bltd52ddb5762440d22</guid>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category>
      <category><![CDATA[Metasploit]]></category><dc:creator><![CDATA[Christopher Granleese]]></dc:creator>
      <pubDate>Fri, 13 Feb 2026 20:01:55 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 02/06/2026]]></title>
      <description><![CDATA[<p></p><h2>Google Summer of Code 2026</h2><p>Our very own Jack Heysel has added some <a href="https://github.com/rapid7/metasploit-framework/pull/20910">documentation</a> which outlines the Metasploit Framework project ideas for GSoC 2026. For anyone interested in applying please see <a href="https://github.com/rapid7/metasploit-framework/blob/master/docs/metasploit-framework.wiki/How-to-Apply-to-GSoC.md">GSoC-How-To-Apply</a> documentation, or reach out on slack to any of the following GSoC mentors on Slack via the <a href="https://metasploit.slack.com/">Metasploit Slack</a>:</p><ul><li>@jheysel</li><li>@zeroSteiner</li><li>@h00die</li></ul><h2>Gladinet</h2><p>This week <a href="https://github.com/Chocapikk">Chocapikk</a> has added some Gladinet CentreStack/Triofox exploitation capabilities. Adding two auxiliary modules and updating an existing exploit. The updated exploit module now accepts a custom <span data-type='inlineCode'>MACHINEKEY</span> option to leverage newly discovered vulnerabilities that allow the extraction of machineKeys from Web.config files. The <span data-type='inlineCode'>gladinet_storage_path_traversal_cve_2025_11371</span> module exploits path traversal to read arbitrary files and extract machineKeys, while <span data-type='inlineCode'>gladinet_storage_access_ticket_forge</span> forges access tickets using hardcoded cryptographic keys.</p><h2>New module content (1)</h2><h3>Gladinet CentreStack/Triofox Access Ticket Forge</h3><p>Authors: Huntress Team, Julien Voisin, and Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a></p><p>Type: Auxiliary</p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20768">#20768</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path: <span data-type='inlineCode'>gather/gladinet_storage_access_ticket_forge</span></p><p></p><p>Description: This adds two auxiliary modules for Gladinet CentreStack/Triofox. Both modules can read arbitrary files and extract the machineKey, which is used to secure ASP.NET ViewState data. Furthermore, this change also includes a new mixin for Gladinet.</p><h2>Enhancements and features (3)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20739">#20739</a> from <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> - This adds MITRE ATT&CK metadata tags to modules relating to Kerberos and unconstrained delegation. This enables users to search for the content based on the ATT&CK technique ID.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20882">#20882</a> from <a href="https://github.com/karanabe">karanabe</a> - Adds the <span data-type='inlineCode'>RSAKeySize</span> advanced option and uses it when generating the CSR key pair, allowing users to increase key size to meet certificate template minimums and avoid <span data-type='inlineCode'>CERTSRV_E_KEY_LENGTH</span> errors when 2048-bit keys are rejected.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20883">#20883</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - Updates Kerberos modules to present a user friendly message when the user specifies the <span data-type='inlineCode'>IMPERSONATE</span> option when running a module but also forgets to specify <span data-type='inlineCode'>IMPERSONATION_TYPE</span>.</li></ul><h2>Bugs fixed (5)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20368">#20368</a> from <a href="https://github.com/isaac-app-dev">isaac-app-dev</a> - Fixes an issue that caused msfvenom to break if it were run from alternative directories.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20680">#20680</a> from <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> - Improves the RPC API with multiple fixes and enhancements.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20834">#20834</a> from <a href="https://github.com/kuklycs">kuklycs</a> - This fixes the NoMethodError in the team_viewer post module, caused by misuse of the <span data-type='inlineCode'>each_key</span> method. The <span data-type='inlineCode'>keys</span> array has been updated to a 1-D array to simplify the logic.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20916">#20916</a> from <a href="https://github.com/Chepycou">Chepycou</a> - Fixes a crash when running the SAP modules <span data-type='inlineCode'>sap_soap_rfc_system_info</span> or <span data-type='inlineCode'>sap_icf_public_info</span>.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20920">#20920</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - This fixes a bug in password cracking modules where the <span data-type='inlineCode'>auto</span> action would crash even when the path to a compatible executable was specified in <span data-type='inlineCode'>CRACKER_PATH</span>.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20910">#20910</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - This adds documentation regarding the projects for which we are soliciting submissions for as part of the Google Summer of Code program.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-01-29T15%3A38%3A16Z..2026-02-04T14%3A20%3A14-05%3A00%22">Pull Requests 6.4.111...6.4.112</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.111...6.4.112">Full diff 6.4.111...6.4.112</a></li></ul><p>If you are a <span data-type='inlineCode'>git</span> user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-02-06-2026</link>
      <guid isPermaLink="false">blt819b76c909c21d56</guid>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category>
      <category><![CDATA[Metasploit]]></category><dc:creator><![CDATA[Christopher Granleese]]></dc:creator>
      <pubDate>Fri, 06 Feb 2026 18:52:32 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt17a0f47d4a54c137/683ddb248ac17c544429ac06/metasploit-ascii-1.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 01/30/2026]]></title>
      <description><![CDATA[<h2>FreeBPX Content Galore</h2><p>This week brings 3 new pieces of module content for targeting FreePBX. All three chain multiple vulnerabilities together, starting with CVE-2025-66039. This initial vulnerability allows unauthenticated users to bypass the authentication process to interact with FreePBX. From this point, the different modules leverage either a SQL injection vulnerability (CVE-2025-61675) or a file upload vulnerability (CVE-2025-61678) to obtain remote code execution.</p><h2>New module content (7)</h2><h3>FreePBX endpoint SQLi to RCE</h3><p>Authors: Noah King and msutovsky-r7 Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20857">#20857</a> contributed by <a href="https://github.com/msutovsky-r7">msutovsky-r7</a> Path: unix/http/freepbx_custom_extension_rce AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-61675&amp;referrer=blog">CVE-2025-61675</a></p><p>Description: This adds exploit module for FreePBX which chains an authentication bypass, CVE-2025-66039, with a SQLi, CVE-2025-61675, which allows for a cron job to be added to the cron_job table of the database to allow for Remote Code Execution.</p><h3>FreePBX firmware file upload</h3><p>Authors: Noah King and msutovsky-r7 Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20858">#20858</a> contributed by <a href="https://github.com/msutovsky-r7">msutovsky-r7</a> Path: unix/http/freepbx_firmware_file_upload AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-61678&amp;referrer=blog">CVE-2025-61678</a></p><p>Description: This adds exploit module for FreePBX which chains an authentication bypass, CVE-2025-66039, with an unrestricted file upload (via firmware upload), CVE-2025-61678, which allows for a webshell to be uploaded to the webserver resulting in remote code execution.</p><h3>FreePBX Custom Extension SQL Injection</h3><p>Authors: Noah King and msutovsky-r7 Type: Auxiliary Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20846">#20846</a> contributed by <a href="https://github.com/msutovsky-r7">msutovsky-r7</a> Path: gather/freepbx_custom_extension_injection AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-61675&amp;referrer=blog">CVE-2025-61675</a></p><p>Description: This adds an exploit module for FreePBX which chains an authentication bypass, (CVE-2025-66039) with an SQLi (CVE-2025-61675) to create an admin user in the database.</p><h3>Cacti Graph Template authenticated RCE versions prior to 1.2.29</h3><p>Authors: Jack Heysel and chutchut Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20799">#20799</a> contributed by <a href="https://github.com/jheysel-r7">jheysel-r7</a> Path: multi/http/cacti_graph_template_rce AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-24367&amp;referrer=blog">CVE-2025-24367</a></p><p>Description: This adds an exploit for CVE-2025-24367 which is an unauthenticated RCE in Cacti.</p><h3>SmarterTools SmarterMail GUID File Upload Vulnerability</h3><p>Authors: Piotr Bazydlo, Sina Kheirkhah, and jheysel-r7 Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20866">#20866</a> contributed by <a href="https://github.com/jheysel-r7">jheysel-r7</a> Path: multi/http/smartermail_guid_file_upload AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-52691&amp;referrer=blog">CVE-2025-52691</a></p><p>Description: This adds a module for unauthenticated file upload in SmarterTools SmaterMail (CVE-2025-52691). The vulnerability allows an unauthenticated user to upload a file to any location on the system using path traversal using the guid variable. The module will either drop a webshell in the webroot directory (if the target is Windows) or create a cron job by dropping a file in /etc/cron.d (if the target is Linux).</p><h3>Burp Extension Persistence</h3><p>Author: h00die Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/19821">#19821</a> contributed by <a href="https://github.com/h00die">h00die</a> Path: multi/persistence/burp_extension</p><p>Description: This adds a new persistence module for BurpSuite. The module adds a malicious extension to both the Pro and Community versions, which is triggered when the user starts BurpSuite.</p><h3>SSH Key Persistence</h3><p>Authors: Dean Welch <a href="mailto:dean_welch@rapid7.com">dean_welch@rapid7.com</a> and h00die <a href="mailto:mike@shorebreaksecurity.com">mike@shorebreaksecurity.com</a> Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20778">#20778</a> contributed by <a href="https://github.com/h00die">h00die</a> Path: multi/persistence/ssh_key</p><p>Description: Combines the Windows and Linux ssh key persistence modules.</p><h2>Enhancements and features (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20778">#20778</a> from <a href="https://github.com/h00die">h00die</a> - Combines the Windows and Linux ssh key persistence modules.</li></ul><h2>Bugs fixed (3)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20897">#20897</a> from <a href="https://github.com/h00die">h00die</a> - This fixes a bug that was preventing collected hash data from being formatted as input for the John the Ripper cracker. The result is that users can now once again crack passwords using John.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20902">#20902</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - This fixes a bug in the auxiliary/scanner/ssh/ssh_login module that would incorrectly state that a login failed when it in fact succeeded but the module was unable to open a session. This was only an issue when the CreateSession option is true.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20909">#20909</a> from <a href="https://github.com/adfoster-r7">adfoster-r7</a> - Fixes a bug in Metasploit Pro that reported false positives for HTTP bruteforcing.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-01-22T00%3A20%3A35Z..2026-01-29T15%3A38%3A16Z%22">Pull Requests 6.4.110...6.4.111</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.110...6.4.111">Full diff 6.4.110...6.4.111</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-01-30-2026</link>
      <guid isPermaLink="false">bltb151cf70e841bfb3</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Fri, 30 Jan 2026 21:11:27 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 01/23/2026]]></title>
      <description><![CDATA[<h2>Oracle E-Business Suite Unauth RCE</h2><p>This week, we are pleased to announce the addition of a module that exploits CVE-2025-61882, a pre-authentication remote code execution vulnerability in Oracle E-Business Suite versions 12.2.3 through 12.2.14. The exploit chains multiple flaws—including SSRF, path traversal, HTTP request smuggling, and XSLT injection—to coerce the target into fetching and executing a malicious XSL file hosted by the attacker. Successful exploitation results in arbitrary command execution and an interactive shell on both Linux/Unix and Windows targets. The module is reliable, repeatable, and we here at Metasploit hope you enjoy it, happy hacking!</p><h2>New module content (3)</h2><h3>Authenticated RCE in Splunk (splunk_archiver app)</h3><p>Authors: Alex Hordijk, Maksim Rogov, and psytester Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20770">#20770</a> contributed by <a href="https://github.com/vognik">vognik</a> Path: linux/http/splunk_auth_rce_cve_2024_36985 AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2024-36985&amp;referrer=blog">CVE-2024-36985</a></p><p>Description: This adds two separate Metasploit exploit modules targeting Remote Code Execution (RCE) vulnerabilities in Splunk Enterprise. CVE-2024-36985 exploits unsafe use of the "copybuckets" lookup function within the splunk_archiver application, resulting in execution of the sudobash helper script with attacker-controlled arguments. Affected versions: All releases prior to 9.0.10, 9.1.2 through 9.1.5, 9.2.0 through 9.2.2 CVE-2022-43571, exploits a Python code injection vulnerability in Splunk SimpleXML dashboards by injecting malicious code into sparkline style parameters. Malicious code is executed when a user exports the dashboard to PDF. Affected versions: All releases prior to 8.1.12, 8.2.0 through 8.2.9, 9.0.0 through 9.0.2.</p><h3>Oracle E-Business Suite CVE-2025-61882 RCE</h3><p>Authors: Mathieu Dupas and watchTowr (Sonny, Sina Kheirkhah, Jake Knott) Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20750">#20750</a> contributed by <a href="https://github.com/MatDupas">MatDupas</a> Path: multi/http/oracle_ebs_cve_2025_61882_exploit_rce AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-61882&amp;referrer=blog">CVE-2025-61882</a></p><p>Description: This adds an exploit for CVE-2025-61882, a critical Remote Code Execution (RCE) vulnerability in Oracle E-Business Suite (EBS). The flaw allows unauthenticated attackers to execute arbitrary code by leveraging a combination of SSRF, HTTP request smuggling and XSLT injection. Affected Versions: Oracle E-Business Suite, 12.2.3-12.2.14.</p><h3>Authenticated RCE in Splunk (SimpleXML dashboard PDF generation)</h3><p>Authors: Danylo Dmytriiev, Maksim Rogov, and psytester Type: Exploit Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20770">#20770</a> contributed by <a href="https://github.com/vognik">vognik</a> Path: multi/http/splunk_auth_rce_cve_2022_43571 AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2022-43571&amp;referrer=blog">CVE-2022-43571</a></p><p>Description: This adds two separate Metasploit exploit modules targeting Remote Code Execution (RCE) vulnerabilities in Splunk Enterprise. CVE-2024-36985 exploits unsafe use of the "copybuckets" lookup function within the splunk_archiver application, resulting in execution of the sudobash helper script with attacker-controlled arguments. Affected versions: All releases prior to 9.0.10, 9.1.2 through 9.1.5, 9.2.0 through 9.2.2 CVE-2022-43571, exploits a Python code injection vulnerability in Splunk SimpleXML dashboards by injecting malicious code into sparkline style parameters. Malicious code is executed when a user exports the dashboard to PDF. Affected versions: All releases prior to 8.1.12, 8.2.0 through 8.2.9, 9.0.0 through 9.0.2.</p><h2>Enhancements and features (3)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20755">#20755</a> from <a href="https://github.com/rudraditya21">rudraditya21</a> - This adds an advanced datastore option, KrbClockSkew, to modules that use Kerberos authentication, allowing operators to adjust the Kerberos clock from the Metasploit side to fix clock skew errors.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20840">#20840</a> from <a href="https://github.com/xaitax">xaitax</a> - This updates the MongoBleed auxiliary module and adds new options. The module can now use Wiz Magic Packet to detect the vulnerability quickly; it can detect compression libraries used by MongoDB (and warns or stops the user if zlib is not enabled). The module can also reuse the MongoDB socket connection during memory scanning, which significantly improves performance. Finally, it can better leak secrets, either by pattern matching or by storing the extracted information in raw or JSON format.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20861">#20861</a> from <a href="https://github.com/bcoles">bcoles</a> - Adds multiple improvements to get_hostname resolution logic for post exploitation modules.</li></ul><h2>Bugs fixed (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20888">#20888</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - Fixes an issue that caused dMSA kerberos authentication to fail.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-01-16T22%3A44%3A19Z..2026-01-22T00%3A20%3A35Z%22">Pull Requests 6.4.108...6.4.110</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.108...6.4.110">Full diff 6.4.108...6.4.110</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-01-23-2026</link>
      <guid isPermaLink="false">blt78261fa56d64f0a3</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Jack Heysel]]></dc:creator>
      <pubDate>Fri, 23 Jan 2026 21:00:28 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 01/16/2026]]></title>
      <description><![CDATA[<h2>Persistence, dMSA Abuse & RCE Goodies</h2><p>This week, we have received a lot of contributions from the community, such as <a href="https://github.com/h00die">h00die</a>, <a href="https://github.com/Chocapikk">Chocapikk</a> and countless others, which is greatly appreciated. This week’s modules and improvements in Metasploit Framework range from new modules, such as dMSA Abuse (resulting in escalation of privilege in Windows Active Directory environments), authenticated and unauthenticated RCE modules, as well as many improvements and additions to the persistence modules and techniques.</p><h2>New module content (13)</h2><h3>BadSuccessor: dMSA abuse to Escalate Privileges in Windows Active Directory</h3><p>Authors: AngelBoy, Spencer McIntyre, and jheysel-r7 </p><p>Type: Auxiliary </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20472">#20472</a> contributed by <a href="https://github.com/jheysel-r7">jheysel-r7</a> </p><p>Path: <span data-type='inlineCode'>admin/ldap/bad_successor</span></p><p>Description: This adds an exploit for "BadSuccessor" which is a vulnerability whereby a user with permissions to an Organizational Unit (OU) in Active Directory can create a Delegated Managed Service Account (dMSA) account in such a way that it can lead to the issuance of a Kerberos ticket for an arbitrary user.</p><h3>Control Web Panel /admin/index.php Unauthenticated RCE</h3><p>Authors: Egidio Romano and Lukas Johannes Möller </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20806">#20806</a> contributed by <a href="https://github.com/JohannesLks">JohannesLks</a> </p><p>Path: <span data-type='inlineCode'>linux/http/control_web_panel_api_cmd_exec</span> </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-67888&amp;referrer=blog">CVE-2025-67888</a></p><p>Description: This adds a new module for Control Web Panel (CVE-2025-67888). The vulnerability is unauthenticated OS command injection through an exposed API. The modules require Softaculous to be installed.</p><h3>Prison Management System 1.0 Authenticated RCE via Unrestricted File Upload</h3><p>Author: Alexandru Ionut Raducu </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20811">#20811</a> contributed by <a href="https://github.com/Xorriath">Xorriath</a> </p><p>Path: <span data-type='inlineCode'>linux/http/prison_management_rce</span> </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2024-48594&amp;referrer=blog">CVE-2024-48594</a></p><p>Description: This adds a new module for Prison Management System 1.0 (CVE-2024-48594). The module requires admin credentials, which are subsequently used to exploit unrestricted file upload to upload a webshell.</p><h3>udev Persistence</h3><p>Author: Julien Voisin </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20796">#20796</a> contributed by <a href="https://github.com/h00die">h00die</a> </p><p>Path: <span data-type='inlineCode'>linux/persistence/udev</span></p><p>Description: This moves the udev persistence module into the persistence category and adds the persistence mixin.</p><h3>n8n Workflow Expression Remote Code Execution</h3><p>Author: Lukas Johannes Möller </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20810">#20810</a> contributed by <a href="https://github.com/JohannesLks">JohannesLks</a> </p><p>Path: <span data-type='inlineCode'>multi/http/n8n_workflow_expression_rce</span></p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-68613&amp;referrer=blog">CVE-2025-68613</a></p><p>Description: This adds a new module for n8n (CVE-2025-68613). The vulnerability is authenticated remote code execution in the workflow expression evaluation engine. The module requires credentials to create a malicious workflow that executes system commands via a JavaScript payload.</p><h3>Web-Check Screenshot API Command Injection RCE</h3><p>Author: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20791">#20791</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path: <span data-type='inlineCode'>multi/http/web_check_screenshot_rce</span> </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-32778&amp;referrer=blog">CVE-2025-32778</a></p><p>Description: Adds an exploit module for CVE-2025-32778, a command injection vulnerability in Web-Check's screenshot API endpoint which allows unauthenticated remote code execution by injecting shell commands via URL query parameters in the /api/screenshot endpoint.</p><h3>Accessibility Features (Sticky Keys) Persistence via Debugger Registry Key</h3><p>Authors: OJ Reeves and h00die </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20751">#20751</a> contributed by <a href="https://github.com/h00die">h00die</a> </p><p>Path: <span data-type='inlineCode'>windows/persistence/accessibility_features_debugger</span></p><p>Description: This updates the Windows sticky keys post persistence module to use the new persistence mixin.</p><h3>WMI Event Subscription Event Log Persistence</h3><p>Authors: Nick Tyrer &lt;@NickTyrer&gt; and h00die </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20706">#20706</a> contributed by <a href="https://github.com/h00die">h00die</a> </p><p>Path: <span data-type='inlineCode'>windows/persistence/wmi/wmi_event_subscription_event_log</span></p><p>Description: Updated the Windows WMI to use a new way of managing persistence modules in Metasploit Framework. The Windows WMI module has been split into four modules, each representing their own technique.</p><h3>WMI Event Subscription Interval Persistence</h3><p>Authors: Nick Tyrer &lt;@NickTyrer&gt; and h00die </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20706">#20706</a> contributed by <a href="https://github.com/h00die">h00die</a> </p><p>Path: <span data-type='inlineCode'>windows/persistence/wmi/wmi_event_subscription_interval</span></p><p>Description: Updated the Windows WMI to use a new way of managing persistence modules in Metasploit Framework. The Windows WMI module has been split into four modules, each representing their own technique.</p><h3>WMI Event Subscription Process Persistence</h3><p>Authors: Nick Tyrer &lt;@NickTyrer&gt; and h00die </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20706">#20706</a> contributed by <a href="https://github.com/h00die">h00die</a> </p><p>Path: <span data-type='inlineCode'>windows/persistence/wmi/wmi_event_subscription_process</span></p><p>Description: Updated the Windows WMI to use a new way of managing persistence modules in Metasploit Framework. The Windows WMI module has been split into four modules, each representing their own technique.</p><h3>WMI Event Subscription Logon Timer Persistence</h3><p>Authors: Nick Tyrer &lt;@NickTyrer&gt; and h00die </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20706">#20706</a> contributed by <a href="https://github.com/h00die">h00die</a> </p><p>Path: <span data-type='inlineCode'>windows/persistence/wmi/wmi_event_subscription_uptime</span></p><p>Description: Updated the Windows WMI to use a new way of managing persistence modules in Metasploit Framework. The Windows WMI module has been split into four modules, each representing their own technique.</p><h3>Linux Chmod</h3><p>Author: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a> </p><p>Type: Payload (Single) </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20845">#20845</a> contributed by <a href="https://github.com/bcoles">bcoles</a> </p><p>Path: <span data-type='inlineCode'>linux/armle/chmod</span> and <span data-type='inlineCode'>linux/aarch64/chmod</span></p><p>Description: Adds Linux ARM 32-bit / 64-bit Little Endian chmod payloads.</p><h2>Enhancements and features (7)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20706">#20706</a> from <a href="https://github.com/h00die">h00die</a> - Updated the Windows WMI to use a new way of managing persistence modules in Metasploit Framework. The Windows WMI module has been split into four modules, each representing their own technique.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20751">#20751</a> from <a href="https://github.com/h00die">h00die</a> - This updates the Windows sticky keys post persistence module to use the new persistence mixin.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20785">#20785</a> from <a href="https://github.com/Chocapikk">Chocapikk</a> - This adds Waku framework support to the existing react2shell module. Waku is a minimal React framework which differs slightly compared to Node.js. The module maintains backward compatibility with existing Next.js targets while adding Waku support through a modular framework configuration system.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20786">#20786</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - This updates the module code to merge the target Arch and Platform entries into the module's top level data. Prior to this change module developers had to define Arch and Platform entries twice, once at the module level and again per individual target. This updates over 500 modules and removes that duplication.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20796">#20796</a> from <a href="https://github.com/h00die">h00die</a> - This moves the udev persistence into the persistence category and adds the persistence mixin.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20853">#20853</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Bumps metapsloit-payloads to 2.0.239.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20855">#20855</a> from <a href="https://github.com/h00die">h00die</a> - Adds additional ATT&CK references to persistence modules.</li></ul><h2>Bugs fixed (2)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20738">#20738</a> from <a href="https://github.com/Shubham0699">Shubham0699</a> - This fixes an issue in the bailiwicked DNS modules that was causing the module to fail with a stack trace due to a programming error.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20847">#20847</a> from <a href="https://github.com/dwelch-r7">dwelch-r7</a> - This updates the auxiliary/scanner/ssh/ssh_login module to remove stale documentation, remove unnecessary characters that were printed in the output and update the correct documentation with the new information about key usage.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20665">#20665</a> from <a href="https://github.com/basicallyabidoof">basicallyabidoof</a> - Adds documentation for the ipv6_neighbor_router_advertisement module.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222026-01-07T06%3A36%3A30-05%3A00..2026-01-14T22%3A53%3A30Z%22">Pull Requests 6.4.106...6.4.107</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.106...6.4.107">Full diff 6.4.106...6.4.107</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-01-16-2026</link>
      <guid isPermaLink="false">bltb32ab5ee97c5e59d</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Simon Janusz]]></dc:creator>
      <pubDate>Fri, 16 Jan 2026 18:49:01 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 01/09/2026]]></title>
      <description><![CDATA[<h2>RISC-V Payloads</h2><p>This week brings more RISC-V payloads from community member <a href="https://github.com/bcoles">bcoles</a>. One provides a new adapter which allows RISC-V payloads to be converted to commands and delivered as a Metasploit fetch-payload. The second is a classic bind shell, offering the user interactive connectivity to the target host. Both of these go a long way in improving Metasploit’s support for RISC-V systems.</p><h2>Annual Wrap Up</h2><p>With a new year comes a new annual wrap up. Earlier this week, the Metasploit project <a href="https://www.rapid7.com/blog/post/pt-metasploit-2025-annual-wrap-up/">posted the annual wrap up</a> covering notable changes from 2025.</p><h2>New module content (4)</h2><h3>Taiga tribe_gig authenticated unserialize remote code execution</h3><p>Authors: rootjog and whotwagner </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20700">#20700</a> contributed by <a href="https://github.com/whotwagner">whotwagner</a> </p><p>Path: <span data-type='inlineCode'>multi/http/taiga_tribe_gig_unserial</span></p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-62368&amp;referrer=blog">CVE-2025-62368</a></p><p>Description: This adds a new module for authenticated deserialization vulnerability in Taiga.io (CVE-2025-62368). The module sends malicious data to exposed API, which performs unsafe deserialization, leading to remote code execution.</p><h3>Python Site-Specific Hook Persistence</h3><p>Author: msutovsky-r7 </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20692">#20692</a> contributed by <a href="https://github.com/msutovsky-r7">msutovsky-r7</a> </p><p>Path: <span data-type='inlineCode'>multi/persistence/python_site_specific_hook</span></p><p>Description: This adds a persistence module which leverages Python's startup mechanism, where some files can be automatically processed during the initialization of the Python interpreter. Someof those files are startup hooks (site-specific, dist-packages). If these files are present in site-specific or dist-packages directories, any lines beginning with import will be executed automatically. This creates a persistence mechanism if an attacker has established access to the target machine with sufficient permissions.</p><h3>Add Linux RISC-V command payload adapters</h3><p>Authors: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a> </p><p>Type: Payload (Adapter) </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20734">#20734</a> contributed by <a href="https://github.com/bcoles">bcoles</a></p><p>Description: This extends fetch payloads for RISC-V targets.</p><h3>Linux Command Shell, Bind TCP Inline</h3><p>Authors: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a> and modexp </p><p>Type: Payload (Single) </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20733">#20733</a> contributed by <a href="https://github.com/bcoles">bcoles</a> </p><p>Path: <span data-type='inlineCode'>linux/riscv32le/shell_bind_tcp</span></p><p>Description: This adds a new payload: a bind shell for Linux RISC-V targets.</p><h2>Bugs fixed (2)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20370">#20370</a> from <a href="https://github.com/msutovsky-r7">msutovsky-r7</a> - Fixes an issue that occurred when negotiating the SMB version and the server uses an unknown dialect. Now, the login function will throw an exception and exit gracefully.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20744">#20744</a> from <a href="https://github.com/ptrstr">ptrstr</a> - This fixes a bug in unix/webapp/wp_reflexgallery_file_upload where the current year and month were being hardcoded in the request. This caused the server to reject the exploit if there was no folder in wp-content/uploads for that specific year and month. Now the year and month are configurable datastore options.</li></ul><h2>Documentation added (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20831">#20831</a> from <a href="https://github.com/DataExplorerX">DataExplorerX</a> - This adds link to issues in Metasploit Framework Github repository.</li></ul><p>You can always find more documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222025-12-30T13%3A59%3A48Z..2026-01-07T06%3A36%3A30-05%3A00%22">Pull Requests 6.4.105...6.4.106</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.105...6.4.106">Full diff 6.4.105...6.4.106</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-01-09-2026</link>
      <guid isPermaLink="false">bltbe45e2d2f14071e0</guid>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category>
      <category><![CDATA[Metasploit]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Fri, 09 Jan 2026 23:07:48 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit 2025 Annual Wrap-Up]]></title>
      <description><![CDATA[<p>Hard to believe it's that time again, and that Metasploit Framework will see the dawn of another Annual Wrap-Up (and a New Year). All of the metrics and modules you see here would in large part not be possible without the dedicated community members who care about the Framework and its mission on all the days of the year. It is their hard work and dedication that makes it look like magic, and sometimes, it feels like it too. A heartfelt thank you to all of our researchers and contributors, you're what makes Metasploit Framework so resilient.</p><p>This year brought its share of notable vulnerabilities, substantial framework improvements, and continued evolution of the project. Whether you submitted a module, filed an issue, or helped triage a bug, your contributions have kept Metasploit relevant and powerful. So without further ado, let's dive into the highlights from 2025.</p><h2>Persistence Overhaul</h2><p>One of the year's significant infrastructure improvements came from community contributor h00die, who spearheaded a massive refactor of Metasploit's persistence modules. The project, tracked in issue <a href="https://github.com/rapid7/metasploit-framework/issues/20374">#20374</a>, involved reorganizing dozens of persistence modules from their scattered locations across the framework into a dedicated persistence directory under exploits. This wasn't just housekeeping—h00die created a standardized persistence mixin that brought consistency to how modules handle installation, cleanup, and option handling. The refactor touched over 30 modules spanning Linux, Windows, OSX, and multi-platform techniques, modernizing each one with proper check methods, MITRE ATT&CK references, and standardized options like WritableDir. The work also laid the groundwork for a persistence suggester module that can automatically recommend viable persistence techniques based on session characteristics.</p><p>The sheer scope of this effort can't be overstated. Breaking the work into manageable chunks, h00die systematically converted modules from the old post-exploitation style to proper exploit modules with the new persistence mixin, handling everything from cron jobs and SSH keys to Windows registry modifications and service installations. The standardization means that all persistence modules now share common behaviors, produce cleanup scripts in a consistent format, and integrate cleanly with the rest of the framework. It's the kind of unglamorous but essential work that improves the entire framework's usability and maintainability, and we're grateful to h00die for taking on such an ambitious project and seeing it through.</p><h2>AD CS Vulnerable Certificate Template Detection and Exploitation Additions</h2><p>This year, Metasploit expanded its Active Directory Certificate Services (AD CS) coverage by adding detection and exploitation support for certificate templates vulnerable to ESC9, ESC10, and ESC16. Checks for these misconfigured certificate templates were integrated into the existing ldap_esc_vulnerable_template module, allowing users to easily identify misconfigured templates during assessments.</p><p>To complement this detection capability, we introduced the new esc_update_ldap_object module, which enables reliable exploitation of these vulnerable templates to escalate privileges. ESC9, ESC10, and ESC16 share a common pattern: each requires control of a user account with write privileges over another user that is permitted to enroll in the vulnerable template. While exploiting these techniques with other tools typically involves multiple manual and error-prone steps, the new module streamlines the entire workflow. Users configure the required datastore options, run the module, and receive a certificate that can be used to escalate privileges within the domain.</p><p>As part of this effort, we also introduced the ldap_object_attribute module, which provides standard CRUD operations for manipulating LDAP objects in Active Directory. This module — along with existing functionality such as shadow_credentials and get_ticket — is used internally by esc_update_ldap_object to abstract away low-level LDAP interactions and simplify exploitation.</p><p>This work included comprehensive documentation covering the configuration of templates vulnerable to ESC9, ESC10, and ESC16, as well as detailed instructions for exploiting each technique using the new module.</p><h3>Active Directory Improvements</h3><p>Related to our AD CS improvements, came new low-level functionality for interacting with Active Directory (AD) Domain Controllers over LDAP. Over the past couple of years, Metasploit has seen multiple modules added that facilitate AD attack workflows including <a href="https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/admin/ldap/shadow_credentials.md">Shadow Credentials</a>, <a href="https://docs.metasploit.com/docs/pentesting/active-directory/kerberos/rbcd.html">RBCD</a>, <a href="https://docs.metasploit.com/docs/pentesting/active-directory/kerberos/unconstrained_delegation.html">Unconstrained Delegation</a>, etc. Like the AD CS attacks, many of these techniques are reliant on access control to some degree. Over the summer, Metasploit introduced <a href="https://github.com/rapid7/metasploit-framework/pull/20345">new functionality</a> to facilitate checking for these types of attacks. This new library provides Active Directory specific functionality, most notably, the ability to remotely evaluate security descriptors to determine whether a particular user or group has a specific access right. This has already been incorporated into the following modules to either enable or improve the existing detection capabilities.</p><ul><li>auxiliary/admin/ldap/shadow_credentials</li><li>auxiliary/admin/ldap/rbcd</li><li>auxiliary/admin/ldap/ad_cs_cert_template</li><li>auxiliary/gather/ldap_esc_vulnerable_cert_finder</li></ul><p>For module authors, the library provides a composable API for determining if an object grants a particular permission to an optional SID. The SID can be either a user or group, and when omitted is automatically set to the authenticating user, i.e. to check if the current connection has the permissions.</p><p>For example, check if the object grants the read and write property permissions with:</p>adds_obj_grants_permissions?(@ldap, obj, SecurityDescriptorMatcher::Allow.all(%i[RP WP]))<br/><h2>Code Cleanup At Scale</h2><p>Beyond new features and modules, 2025 also saw substantial code quality improvements thanks to community contributor bcoles, who took on the often-thankless task of resolving RuboCop violations across the codebase. Throughout the year, bcoles systematically worked through older modules, cleaning up style inconsistencies, fixing syntax violations, and converting outdated property types to proper boolean values in auxiliary scanners and exploit modules. This kind of incremental maintenance work—fixing redundant parentheses here, resolving style violations there—doesn't make for flashy headlines, but it keeps the codebase maintainable and makes life easier for everyone working in the framework. Code quality matters, and we're grateful to bcoles for putting in the work to keep Metasploit's technical debt in check.</p><h2>Payload Improvements</h2><p>It may be a fun fact, or perhaps tribal knowledge that an “exploit” to Metasploit is a module that delivers a payload. All the great exploit content this year would be nothing without corresponding payloads to deliver and we make sure that those get plenty of our time as well. The following changes in particular are highly impactful and may have gone unnoticed while the flashier exploits received all the attention.</p><h3>Windows Meterpreter Improvements</h3><p>The biggest updates for the Windows Meterpreter revolve around two major improvements: the first is the upgrade to ReflectiveDLLInjection, made by Alex (xaitax) Hagenah, for which we express our gratitude for improving this area of the Metasploit Framework that requires a high level of attention to detail. This update introduces full, production-ready ARM64 support and a comprehensive architectural modernization of the whole library. These changes open the door to future support for a native ARM64 Meterpreter on Windows. Additionally, Metasploit split the standard API extension for Windows this year. This was actually the design used in the original Meterpreter implementation and we’ve reconsidered the monolithic approach. This improvement is one of the multiple steps we have in the pipeline to improve the evasion capabilities for our Windows Meterpreter. The standard API library now allows the user to load only specific subcomponents of the extension (for example, the component for network or file-system interaction), reducing the memory footprint for memory scanners. To leverage this new functionality, set AutoLoadStdapi to False, and then load one or more extensions manually, e.g. load stdapi_fs. To maintain backwards compatibility, a single stdapi extension is also still available and can be loaded with load stdapi.</p><h3>Fetch Payload Improvements</h3><p>The first milestone was the introduction of fileless execution for Linux fetch payloads, enabling payloads to run directly from memory using anonymous files. This advancement greatly enhances operational stealth by minimizing forensic traces and avoiding file-based detection, with careful attention to safe, opt-in behavior and collaborative code refinement. Following this, the FETCH_PIPE option streamlined payload deployment into a single, compact command. This improvement enhanced both usability and evasion, while also supporting larger, more complex command payloads (such as fileless execution) to be executed even with reduced command size. Additionally, fetch payload support has expanded to seven additional CPU architectures: aarch64, armbe, armle, mipsbe, mipsle, ppc, and ppc64le. This significantly broadens Metasploit's reach across embedded and legacy systems. Both features are thoroughly tested and future-proof, making the framework more versatile and powerful.</p><h3>New Architectures Basic Support</h3><p>This year, we have also updated the framework to support new basic payloads. We have introduced the exec payload for Windows ARM64 (provided by Alex (xaitax) Hagenah), reverse shell for RISC-V 32 and 64 bit, and Loongarch64 (both provided by bcoles).</p><h3>COMING SOON</h3><p>As much as we try, everything doesn’t always fit into one year. With that in mind, we wanted to highlight some upcoming features that we’re particularly excited to complete in the coming months.</p><h4>Malleable C2</h4><p>The malleable c2 will allow the user to specify with a .profile scribing how the HTTP requests between meterpreter and metasploit-framework should look like, allowing metasploit to hide the distinctive traffic generated by the session communication.</p><h4>Direct Syscall in Metsrv</h4><p>We have updated the Meterpreter core (metsrv) to remove common static signatures, such as specific strings and function imports, making it harder to detect.</p><h4>PoolParty for 32-bit systems</h4><p>Additional work to port the poolparty injection on native 32 bit system, Huge thanks to xHector1337 for taking over the research and extension of the code injection for the new architecture.</p><h2>SCCM Modules</h2><p>This year, Metasploit added two modules for targeting SCCM instances and recovering the Network Access Account credentials. These modules differ in how they perform the authentication. The first, auxiliary/admin/sccm/get_naa_credentials accepts credentials from the operator and will use them to authenticate and run the attack on demand. This pairs nicely with the auxiliary/admin/dcerpc/samr_account module when the operator can create a new machine account. However, when that’s not an option, Metasploit still has you covered with the auxiliary/server/relay/relay_get_naa_credentials variant that enables relaying NTLM authentication from an SMB server. These attack workflows were demonstrated at Black Hat and DEF CON over the summer and we anticipate they’ll remain useful in the future.</p><h2>Module Highlights</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20713">CVE-2025-9316, CVE-2025-11700 N-able N-Central XXE</a> – N-able N-Central is a popular Remote Monitoring and Management (RMM) platform. These two vulnerabilities, when combined, enable Metasploit to read local files without authenticating. This can be used to obtain a number of sensitive backup files from the application itself, or anything else on the host system. XXE attacks are a less common vulnerability, at least in Metasploit-land but this is a fantastic example of how impactful they can be.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20112">CVE-2025-22457 Ivanti Connect Secure Unauthenticated RCE</a> – Ivanti RCEs are always valuable and this module shows that memory corruption lives on in 2025. Not only is this exploit unauthenticated and reliable, it is a great example of how ROP chains can be used.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/19897">CVE-2024-55555 Invoice Ninja RCE</a> – This particular module leverages a PHP deserialization vulnerability within the application. While this vulnerability requires knowledge of the APP_KEY, successful exploitation could have significant financial implications. As an added bonus, this module came with a new library adding support for Laravel Framework-specific cryptography methods.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/19950">CVE-2024-55556 InvoiceShelf RCE</a> – Everyone loves a good pairing, and this module continues h00die-gr3y’s work on invoicing software, showing that they’re useful for receiving more than just payments.</li><li>LDAP Password Disclosure – This module has been around for a while, but received some new features in 2025 for targeting Active Directory Domain Controllers. The <a href="https://github.com/rapid7/metasploit-framework/pull/20017">first</a> added support for LAPSv1 and v2, enabling the module to recover the local admin account on systems. Later in the year, a <a href="https://github.com/rapid7/metasploit-framework/pull/20401">second</a> improvement added support for gMSA accounts. This module also pairs nicely with the new <a href="https://github.com/rapid7/metasploit-framework/pull/19832">SMB to LDAP NTLM Relay</a> module we added this year as well.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20409">Microsoft SharePoint ToolPane Unauthenticated RCE (CVE-2025-53770 and CVE-2025-53771)</a></li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20060">Exploit module for CVE-2025-32433 (Erlang/OTP)</a></li></ul><h3>SMB Relay Expansion</h3><p>This year, Metasploit significantly leveled up its relaying capabilities, transforming the framework’s only SMB to SMB relay capability into a powerful engine for lateral movement. Traditionally, SMB relaying was often the domain of standalone external tools, but through the dedicated work of the Metasploit team, these workflows are now seamlessly integrated into the framework</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/19832">SMB to LDAP relay module</a></li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20637">SMB to MSSQL NTLM Relay module</a></li></ul><h2><span style='font-size: undefined;'>Community Stats Recap</span></h2><p>A huge thank you from the entire Metasploit team to all 66 contributors in 2025. Your contributions and ideas are what continue to improve this tool every year. Notably, 41 of these were first-time contributors who added new code.</p><p>Here are some stats for 2025:</p><ul><li>Number of new modules: 139</li><li>Number of new bug fixes: 133</li><li>Number of new enhancements: 115</li><li>Number of new documentations: 19</li><li>Number of new payload enhancements: 18</li></ul><p>Contributors in 2025 (ordered by count)</p><ul><li>bcoles</li><li>h00die</li><li>Chocapikk</li><li>h00die-gr3y</li><li>Takahiro-Yoko</li><li>h4x-x0r</li><li>smashery</li><li>vognik (new in 2025)</li><li>jvoisin</li><li>xHector1337 (new in 2025)</li><li>jmartin-tech</li><li>mariomontecatine (new in 2025)</li><li>blue0x1 (new in 2025)</li><li>nakkouchtarek (new in 2025)</li><li>molecula2788</li><li>xaitax</li><li>happybear-21 (new in 2025)</li><li>e2002e</li><li>fabpiaf (new in 2025)</li><li>mekhalleh</li><li>JohannesLks (new in 2025)</li><li>BitTheByte (new in 2025)</li><li>todb</li><li>00nx (new in 2025)</li><li>DevBuiHieu (new in 2025)</li><li>SweilemCodes (new in 2025)</li><li>arpitjain099 (new in 2025)</li><li>L-codes</li><li>Zeecka (new in 2025)</li><li>aaryan-11-x</li><li>whotwagner</li><li>lafried (new in 2025)</li><li>sebaspf (new in 2025)</li><li>hantwister (new in 2025)</li><li>tastyrce (new in 2025)</li><li>easymoney322 (new in 2025)</li><li>gardnerapp</li><li>TheBigStonk (new in 2025)</li><li>0xAryan (new in 2025)</li><li>sempervictus</li><li>szymonj99</li><li>Mathiou04</li><li>vultza (new in 2025)</li><li>enty8080 (new in 2025)</li><li>SaiSakthidar (new in 2025)</li><li>Zedeldi (new in 2025)</li><li>stfnw (new in 2025)</li><li>mmacfadden (new in 2025)</li><li>daffainfo (new in 2025)</li><li>HamzaSahin61 (new in 2025)</li><li>survivant (new in 2025)</li><li>uhei</li><li>EchoSl0w (new in 2025)</li><li>jeffmcjunkin</li><li>BenoitDePaoli (new in 2025)</li><li>randomstr1ng</li><li>2tunnels (new in 2025)</li><li>rodolphopivetta (new in 2025)</li><li>RakRakGaming (new in 2025)</li><li>Desiree05 (new in 2025)</li><li>Wopseeion (new in 2025)</li><li>jphamgithub (new in 2025)</li><li>H4k1l (new in 2025)</li><li>fishBone000 (new in 2025)</li><li>xl4635 (new in 2025)</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-2025-annual-wrap-up</link>
      <guid isPermaLink="false">blt8410ea0709abb3b7</guid>
      <category><![CDATA[Metasploit]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Mon, 05 Jan 2026 20:31:31 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 12/19/2025]]></title>
      <description><![CDATA[<h2>React2Shell Payload Improvements</h2><p>Last week Metasploit released an exploit for the React2Shell vulnerability, and this week we have made a couple of improvements to the payloads that it uses. The first improvement affects all Metasploit modules. When an exploit is used, an initial payload is selected using some basic logic that effectively would make a selection from the first available in alphabetical order. Now Metasploit will prefer a default of x86 Meterpreters for Windows systems (since 32-bit payloads work on both 32-bit and 64-bit versions of Windows) and x64 Meterpreters for all other platforms including Linux. In the context of React2Shell, this means the payload now defaults to x64 for Linux instead of AARCH64.</p><p>Another improvement that only affects this exploit was the change of the default payload to one leveraging Node.js which is more likely to be present than the wget binary that was required. These defaults should hopefully help users get started with this high-impact exploit with more ease, but of course any compatible payload can still be selected.</p><p>Stay tuned for the Metasploit annual wrap-up and roadmap announcement coming up!</p><h2>New module content (2)</h2><h3>N-able N-Central Authentication Bypass and XXE Scanner</h3><p>Authors: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> and Zach Hanley (Horizon3.ai) </p><p>Type: Auxiliary </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20713">#20713</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path: <span data-type='inlineCode'>scanner/http/nable_ncentral_auth_bypass_xxe</span></p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-11700&amp;referrer=blog">CVE-2025-11700</a></p><p>Description: This adds an auxiliary module that exploits two CVEs affecting N-able N-Central. CVE-2025-9316, an Unauthenticated Session Bypass and CVE-2025-11700 a XXE (XML External Entity) vulnerability. The module combines both vulnerabilities to achieve unauthenticated file read on affected N-Central instances (versions &lt; 2025.4.0.9).</p><h3>Grav CMS Twig SSTI Authenticated Sandbox Bypass RCE</h3><p>Author: Tarek Nakkouch </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20749">#20749</a> contributed by <a href="https://github.com/nakkouchtarek">nakkouchtarek</a> </p><p>Path: <span data-type='inlineCode'>multi/http/grav_twig_ssti_sandbox_bypass_rce</span></p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-66301&amp;referrer=blog">CVE-2025-66301</a></p><p>Description: This adds an exploit module for a Server-Side Template Injection (SSTI) vulnerability (CVE-2025-66294) in Grav CMS, versions prior to 1.8.0-beta.27 , that allows bypassing the Twig sandbox to achieve remote code execution. To inject the malicious payload into a form's process section, this module leverages CVE-2025-66301, a broken access control flaw in the /admin/pages/{page_name} endpoint.</p><h2>Enhancements and features (2)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20424">#20424</a> from <a href="https://github.com/cdelafuente-r7">cdelafuente-r7</a> - Updates how vulnerabilities and services are reported by adding a resource field to both models. It also add a parents field to make layered services possible. An optional resource field can now be provided and the existing service field has been updated to also accept an option hash.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20771">#20771</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - Updates Metasploit's default payload selection logic to preference x86 payloads over AARCH64 payloads.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20773">#20773</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - This updates the exploit for React2Shell with a better default payload.</li></ul><p></p><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222025-12-10T17%3A05%3A19Z..2025-12-17T23%3A32%3A14Z%22">Pull Requests 6.4.102...6.4.103</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.102...6.4.103">Full diff 6.4.102...6.4.103</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/metasploit-wrap-up-12-19-2025</link>
      <guid isPermaLink="false">blt6746f989407cb892</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Fri, 19 Dec 2025 21:02:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0d50271a40a5f14f/6849ab419621d9f3824d5017/metasploit-sky.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 12/12/2025]]></title>
      <description><![CDATA[<h2>React2shell Module</h2><p>As you may have heard, on December 3, 2025, the React team announced a critical Remote Code Execution (RCE) vulnerability in servers using the React Server Components (RSC) Flight protocol. The vulnerability, tracked as <a href="https://attackerkb.com/assessments/0a808ee6-5df2-443a-a634-813dc0946305">CVE-2025-55182</a>, carries a CVSS score of 10.0 and is informally known as "React2Shell". It allows attackers to achieve prototype pollution during deserialization of RSC payloads by sending specially crafted multipart requests with "proto", "constructor", or "prototype" as module names. We're happy to announce that community contributor <a href="https://github.com/vognik">vognik</a> submitted an exploit module for React2Shell which landed earlier this week and is included in this week's release.</p><h2>MSSQL Improvements</h2><p>Over the past couple of weeks Metasploit has made a couple of key improvements to the framework’s MSSQL attack capabilities. The first (<a href="https://github.com/rapid7/metasploit-framework/pull/20637">PR 20637</a>) is a new NTLM relay module, <span data-type='inlineCode'>auxiliary/server/relay/smb_to_mssql</span>, which enables users to start a malicious SMB server that will relay authentication attempts to one or more target MSSQL servers. When successful, the Metasploit operator will have an interactive session to the MSSQL server that can be used to run interactive queries, or MSSQL auxiliary modules.</p><p>Building on this work, it became clear that users would need to interact with MSSQL servers that required encryption as many do in hardened environments. To achieve that objective, <a href="https://github.com/rapid7/metasploit-framework/issues/18745">issue 18745</a> was closed by updating Metasploits MSSQL protocol library to offer better encryption support. Now, Metasploit users can open interactive sessions to servers that offer and even require encrypted connections. This functionality is available automatically in the <span data-type='inlineCode'>auxiliary/scanner/mssql/mssql_login </span>and new <span data-type='inlineCode'>auxiliary/server/relay/smb_to_mssql </span>modules.</p><h2>New module content (5)</h2><h3>Magento SessionReaper</h3><p>Authors: Blaklis, Tomais Williamson, and Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20725">#20725</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path:<span data-type='inlineCode'>multi/http/magento_sessionreaper</span></p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-54236&amp;referrer=blog">CVE-2025-54236</a></p><p>Description: This adds a new exploit module for CVE-2025-54236 (SessionReaper), a critical vulnerability in Magento/Adobe Commerce that allows unauthenticated remote code execution. The vulnerability stems from improper handling of nested deserialization in the payment method context, combined with an unauthenticated file upload endpoint.</p><h3>Unauthenticated RCE in React and Next.js</h3><p>Authors: Lachlan Davidson, Maksim Rogov, and maple3142 </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20760">#20760</a> contributed by <a href="https://github.com/sfewer-r7">sfewer-r7</a> </p><p>Path: <span data-type='inlineCode'>multi/http/react2shell_unauth_rce_cve_2025_55182</span> </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-66478&amp;referrer=blog">CVE-2025-66478</a></p><p>Description: This adds an exploit for CVE-2025-55182 which is an unauthenticated RCE in React. This vulnerability has been referred to as React2Shell.</p><h3>WordPress King Addons for Elementor Unauthenticated Privilege Escalation to RCE</h3><p>Authors: Peter Thaleikis and Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a> </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20746">#20746</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path: <span data-type='inlineCode'>multi/http/wp_king_addons_privilege_escalation</span> </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-8489&amp;referrer=blog">CVE-2025-8489</a></p><p>Description: This adds an exploit module for CVE-2025-8489, an unauthenticated privilege escalation vulnerability in the WordPress King Addons for Elementor plugin (versions 24.12.92 to 51.1.14). The vulnerability allows unauthenticated attackers to create administrator accounts by specifying the user_role parameter during registration, enabling remote code execution through plugin upload.</p><h3>Linux Reboot</h3><p>Author: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a> </p><p>Type: Payload (Single) </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20682">#20682</a> contributed by <a href="https://github.com/bcoles">bcoles</a> </p><p>Path:<span data-type='inlineCode'>linux/loongarch64/reboot</span></p><p>Description: This extends our payloads support to a new architecture, LoongArch64. The first payload introduced for this new architecture is the reboot payload, which will cause the target system to restart once triggered.</p><h2>Enhanced Modules (2)</h2><p>Modules which have either been enhanced, or renamed:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20736">#20736</a> from <a href="https://github.com/sfewer-r7">sfewer-r7</a> - This pull requests updates the exploit/linux/http/fortinet_fortiweb_rce module (added in <a href="https://github.com/rapid7/metasploit-framework/pull/20717">https://github.com/rapid7/metasploit-framework/pull/20717</a>) to add in support for older version of FortiWeb, versions 6.*, which are no longer under support from the vendor.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20747">#20747</a> from <a href="https://github.com/vognik">vognik</a> - This adds an exploit for <a href="https://github.com/advisories/GHSA-fv66-9v8q-g76r">CVE-2025-55182</a> which is an unauthenticated RCE in React. This vulnerability has been referred to as React2Shell.</li></ul><h2>Enhancements and features (1)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20704">#20704</a> from <a href="https://github.com/dwelch-r7">dwelch-r7</a> - The module auxiliary/scanner/ssh/ssh_login_pubkey has been removed. Its functionality has been moved into auxiliary/scanner/ssh/ssh_login.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222025-12-05T16%3A17%3A18Z..2025-12-10T17%3A05%3A19Z%22">Pull Requests 6.4.101...6.4.102</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.101...6.4.102">Full diff 6.4.101...6.4.102</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-12-12-2025</link>
      <guid isPermaLink="false">blt2b9aa8b6e09307c3</guid>
      <category><![CDATA[Metasploit]]></category>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category><dc:creator><![CDATA[Spencer McIntyre]]></dc:creator>
      <pubDate>Fri, 12 Dec 2025 20:38:50 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7464fe659cab8a01/6852c358419e54d8e21c3458/blog-metasploit-wrap-up-.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Metasploit Wrap-Up 12/05/2025]]></title>
      <description><![CDATA[<p></p><h2>Twonky Auth Bypass, RCEs and RISC-V Reverse Shell Payloads</h2><p>This was another fantastic week in terms of PR contribution to the Metasploit Framework. Rapid7’s very own Ryan Emmons recently disclosed CVE-2025-13315 and CVE-2025-13316 which exist in Twonky Server and allow decrypting admin credentials by reading logs without authentication (which contain them). The auxiliary module Ryan submitted which exploits both of these CVEs was released this week. Community contributor Valentin Lobsein aka Chocapikk has returned to the PR queue with a welcomed vengeance. Two modules from Chocapikk were landed this week, a Monsta FTP downloadFile Remote Code Execution module along with a WordPress AI Engine Plugin MCP Unauthenticated Admin Creation to RCE. In addition to some awesome module content, community contributor bcoles added Linux RISC-V 32-bit/64-bit TCP reverse shell payloads.</p><h2>New module content (5)</h2><h3>Twonky Server Log Leak Authentication Bypass</h3><p>Author: remmons-r7 </p><p>Type: Auxiliary </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20709">#20709</a> contributed by <a href="https://github.com/remmons-r7">remmons-r7</a> </p><p>Path: gather/twonky_authbypass_logleak </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-13316&amp;referrer=blog">CVE-2025-13316</a></p><p>Description: This module exploits two CVEs: CVE-2025-13315 and CVE-2025-13316. Both CVEs exist in Twonky Server and allow decrypting admin credentials by reading logs without authentication (which contain them). Then, because the module uses hardcoded keys, it decrypts those credentials.</p><h3>Monsta FTP downloadFile Remote Code Execution</h3><p>Authors: Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a>, msutovsky-r7, and watchTowr Labs </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20718">#20718</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path: multi/http/monsta_ftp_downloadfile_rce </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-34299&amp;referrer=blog">CVE-2025-34299</a></p><p>Description: This add module for CVE-2025-34299. The module exploits a vulnerability in the downloadFile action which allows an attacker to connect to a malicious FTP server and download arbitrary files to arbitrary locations on the Monsta FTP server.</p><h3>WordPress AI Engine Plugin MCP Unauthenticated Admin Creation to RCE</h3><p>Authors: Emiliano Versini, Khaled Alenazi (Nxploited), Valentin Lobstein <a href="mailto:chocapikk@leakix.net">chocapikk@leakix.net</a>, and dledda-r7 </p><p>Type: Exploit </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20720">#20720</a> contributed by <a href="https://github.com/Chocapikk">Chocapikk</a> </p><p>Path: multi/http/wp_ai_engine_mcp_rce </p><p>AttackerKB reference: <a href="https://attackerkb.com/search?q=CVE-2025-11749&amp;referrer=blog">CVE-2025-11749</a></p><p>Description: This adds a new exploit module for an unauthenticated vulnerability in the WordPress AI Engine plugin, which has over 100,000 active installations. The vulnerability allows an attacker to create an administrator account via the MCP (Model Context Protocol) endpoint without authentication, then upload and execute a malicious plugin to achieve remote code execution. The vulnerability is being tracked as CVE-2025-11749.</p><h3>Linux Command Shell, Reverse TCP Inline</h3><p>Authors: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a> and modexp </p><p>Type: Payload (Single) </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20712">#20712</a> contributed by <a href="https://github.com/bcoles">bcoles</a> </p><p>Path: linux/riscv32le/shell_reverse_tcp</p><p>Description: This adds Linux RISC-V 32-bit/64-bit TCP reverse shell payloads.</p><h3>Linux Command Shell, Reverse TCP Inline</h3><p>Authors: bcoles <a href="mailto:bcoles@gmail.com">bcoles@gmail.com</a> and modexp </p><p>Type: Payload (Single) </p><p>Pull request: <a href="https://github.com/rapid7/metasploit-framework/pull/20712">#20712</a> contributed by <a href="https://github.com/bcoles">bcoles</a> </p><p>Path: linux/riscv64le/shell_reverse_tcp</p><p>Description: This adds Linux RISC-V 32-bit/64-bit TCP reverse shell payloads.</p><h2>Enhancements and features (3)</h2><ul><li><a href="https://github.com/rapid7/metasploit-framework/pull/20658">#20658</a> from <a href="https://github.com/jheysel-r7">jheysel-r7</a> - This adds a number of accuracy enhancements to the ldap_esc_vulnerable_cert_finder module. It also adds a CertificateAuthorityRhost datastore option to the esc_update_ldap_object module so the operator can specify an IP Address explicitly in cases where the hostname cannot be resolved via DNS.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20677">#20677</a> from <a href="https://github.com/zeroSteiner">zeroSteiner</a> - This enables sessions to MSSQL servers that require encryption. These changes add a new MsTds::Channel which leverages Rex's socket abstraction to facilitate the necessary encapsulation for the TLS negotiation.</li><li><a href="https://github.com/rapid7/metasploit-framework/pull/20741">#20741</a> from <a href="https://github.com/SaiSakthidar">SaiSakthidar</a> - This removes CAIN as an output format for collected hashes.</li></ul><h2>Documentation</h2><p>You can find the latest Metasploit documentation on our docsite at <a href="https://docs.metasploit.com/">docs.metasploit.com</a>.</p><h2>Get it</h2><p>As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:</p><ul><li><a href="https://github.com/rapid7/metasploit-framework/pulls?q=is:pr+merged:%222025-11-27T00%3A33%3A37Z..2025-12-05T16%3A17%3A18Z%22">Pull Requests 6.4.100...6.4.101</a></li><li><a href="https://github.com/rapid7/metasploit-framework/compare/6.4.100...6.4.101">Full diff 6.4.100...6.4.101</a></li></ul><p>If you are a git user, you can clone the <a href="https://github.com/rapid7/metasploit-framework">Metasploit Framework repo</a> (master branch) for the latest. To install fresh without using git, you can use the open-source-only <a href="https://github.com/rapid7/metasploit-framework/wiki/Nightly-Installers">Nightly Installers</a> or the commercial edition <a href="https://www.rapid7.com/products/metasploit/download/">Metasploit Pro</a></p><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-12-05-2025</link>
      <guid isPermaLink="false">bltdb99a221b8d25cb7</guid>
      <category><![CDATA[Metasploit Weekly Wrapup]]></category>
      <category><![CDATA[Metasploit]]></category><dc:creator><![CDATA[Jack Heysel]]></dc:creator>
      <pubDate>Fri, 05 Dec 2025 20:58:04 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0475760a2990dfd7/6849ab41a770d7563190a3ea/metasploit-fence.png" medium="image" />
    </item>
  </channel>
</rss>