module

Web-Check Screenshot API Command Injection RCE

Disclosed
Apr 12, 2025
Created
Jan 13, 2026

Description

This module exploits a command injection vulnerability in Web-Check's `/api/screenshot` endpoint.
The `directChromiumScreenshot()` function uses `child_process.exec()` with unsanitized user input,
allowing command injection via URL query parameters. The vulnerability was patched in commit
0e4958aa10b2650d32439a799f6fc83a7cd46cef by replacing `exec()` with `execFile()`.

Author

Valentin Lobstein [email protected]

Platform

Linux,Unix,Windows

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/web_check_screenshot_rce
msf exploit(web_check_screenshot_rce) > show targets
...targets...
msf exploit(web_check_screenshot_rce) > set TARGET < target-id >
msf exploit(web_check_screenshot_rce) > show options
...show and set options...
msf exploit(web_check_screenshot_rce) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.