module

Eclipse Che machine-exec Unauthenticated RCE

Disclosed
Dec 1, 2025
Created
Mar 25, 2026

Description

This module exploits an unauthenticated remote code execution vulnerability
in the Eclipse Che machine-exec service (CVE-2025-12548). The machine-exec
service, exposed on port 3333 within Red Hat OpenShift DevSpaces developer
workspace containers, accepts WebSocket connections without authentication.

An attacker can connect to the machine-exec service and execute arbitrary
commands via JSON-RPC over WebSocket. This allows lateral movement between
workspaces and potential cluster compromise.

The vulnerability affects Red Hat OpenShift DevSpaces environments where
the machine-exec service is network-accessible.

Authors

Richard Leach
Greg Durys [email protected]

Platform

Linux,Unix

Architectures

cmd, x86, x64, aarch64

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/linux/http/eclipse_che_machine_exec_rce
msf exploit(eclipse_che_machine_exec_rce) > show targets
...targets...
msf exploit(eclipse_che_machine_exec_rce) > set TARGET < target-id >
msf exploit(eclipse_che_machine_exec_rce) > show options
...show and set options...
msf exploit(eclipse_che_machine_exec_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.