Products and Tools

Metasploit Wrap-Up 10/17/2025

|Last updated on Oct 17, 2025|xx min read
Metasploit Wrap-Up 10/17/2025

New module content (1)

Remote Code Execution Vulnerability in MotionEye Frontend (CVE-2025-60787)

Authors: Maksim Rogov and prabhatverma47 

Type: Exploit Pull request: #20585 contributed by vognik 

Path: linux/http/motioneye_auth_rce_cve_2025_60787 

AttackerKB reference: CVE-2025-60787

Description: Adds a module targeting CVE-2025-60787, an authenticated template injection vulnerability in MotionEye versions <= 0.43.1b4.

Enhancements and features (1)

  • #20621 from h00die - This updates and refactors the "periodic_script" persistence module to use new persistence mixin.

Bugs fixed (3)

  • #20608 from molecula2788 - Fixes a bug with the Windows PE Inject payload.

  • #20611 from bcoles - Fixes a bug in the exploit/multi/local/periodic_script_persistence module which caused issues for the Local Exploit Suggester.

  • #20546 from dwelch-r7 - This fixes multiple issues that were present in the auxiliary/scanner/ssh/ssh_login_pubkey module.

Documentation added (1)

  • #20622 from h00die - Updates module documentation headers for consistency.

You can always find more documentation on our docsite at docs.metasploit.com.

Get it

As always, you can update to the latest Metasploit Framework with msfupdate and you can get more details on the changes since the last blog post from GitHub:

If you are a git user, you can clone the Metasploit Framework repo (master branch) for the latest. To install fresh without using git, you can use the open-source-only Nightly Installers or the commercial edition Metasploit Pro

LinkedInFacebookXBluesky

Related blog posts