module
Eclipse Che machine-exec Unauthenticated RCE
| Disclosed | Created |
|---|---|
| Dec 1, 2025 | Mar 25, 2026 |
Disclosed
Dec 1, 2025
Created
Mar 25, 2026
Description
This module exploits an unauthenticated remote code execution vulnerability
in the Eclipse Che machine-exec service (CVE-2025-12548). The machine-exec
service, exposed on port 3333 within Red Hat OpenShift DevSpaces developer
workspace containers, accepts WebSocket connections without authentication.
An attacker can connect to the machine-exec service and execute arbitrary
commands via JSON-RPC over WebSocket. This allows lateral movement between
workspaces and potential cluster compromise.
The vulnerability affects Red Hat OpenShift DevSpaces environments where
the machine-exec service is network-accessible.
in the Eclipse Che machine-exec service (CVE-2025-12548). The machine-exec
service, exposed on port 3333 within Red Hat OpenShift DevSpaces developer
workspace containers, accepts WebSocket connections without authentication.
An attacker can connect to the machine-exec service and execute arbitrary
commands via JSON-RPC over WebSocket. This allows lateral movement between
workspaces and potential cluster compromise.
The vulnerability affects Red Hat OpenShift DevSpaces environments where
the machine-exec service is network-accessible.
Authors
Richard Leach
Greg Durys [email protected]
Greg Durys [email protected]
Platform
Linux,Unix
Architectures
cmd, x86, x64, aarch64
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.