Metasploit Update Introduces 7 Exploit Modules Affecting Popular Enterprise Platforms


A significant Metasploit Framework update (version 6.4.111) featuring seven new exploit modules that target critical vulnerabilities across widely deployed enterprise systems.

This release demonstrates the increasing sophistication of attack chains leveraging authentication bypass vulnerabilities chained with subsequent code execution techniques.

FreePBX Vulnerability Chain Takes Center Stage

Rapid7 introduces three specialized modules targeting FreePBX, a popular open-source IP PBX system used by enterprises for telephony infrastructure.

These modules exploit a critical authentication bypass vulnerability (CVE-2025-66039) as an entry point, which unauthenticated attackers can leverage to interact with the system without credentials.

From this initial foothold, threat actors can execute two distinct attack paths. The first chains the authentication bypass with a SQL injection vulnerability (CVE-2025-61675) to inject malicious cron jobs into the database, achieving remote code execution.

The second path leverages an unrestricted file upload vulnerability (CVE-2025-61678) within the firmware upload functionality to deploy webshells directly to the webserver.

Additionally, an auxiliary module enables attackers to create administrative database accounts by combining the same authentication bypass with the SQL injection flaw.

Beyond FreePBX, the update addresses critical vulnerabilities in other enterprise systems. A new Cacti exploit module targets CVE-2025-24367, an unauthenticated remote code execution flaw affecting Cacti versions prior to 1.2.29.

Cacti, widely used for network monitoring and graphing, represents significant exposure for infrastructure-dependent organizations.

SmarterTools SmarterMail users face threats from CVE-2025-52691, an unauthenticated file upload vulnerability exploitable through path traversal via the guid parameter.

Module Name CVE Vulnerability Type Impact
FreePBX Custom Extension SQLi to RCE CVE-2025-61675 Auth Bypass + SQLi Remote Code Execution
FreePBX Firmware File Upload CVE-2025-61678 Auth Bypass + File Upload Remote Code Execution
FreePBX Custom Extension Injection CVE-2025-61675 Auth Bypass + SQLi Administrative Access
Cacti Graph Template RCE CVE-2025-24367 Unauthenticated RCE Remote Code Execution
SmarterMail GUID File Upload CVE-2025-52691 Path Traversal + File Upload Remote Code Execution
BurpSuite Extension Persistence N/A Malicious Extension Persistent Access
SSH Key Persistence N/A Key Generation Persistent Access

The Metasploit module adapts its payload delivery based on the target operating system, deploying webshells on Windows systems or establishing persistence through cron jobs on Linux systems.

Persistence and Post-Exploitation Capabilities

Two new persistence modules extend post-exploitation capabilities. The BurpSuite persistence module injects malicious extensions into both Pro and Community editions, maintaining access whenever the application launches.

An SSH key persistence module consolidates Windows and Linux SSH key generation techniques, enabling long-term backdoor access across diverse infrastructure environments.

Organizations deploying FreePBX, Cacti, or SmarterMail systems should prioritize security assessments and implement the latest patches.

System administrators can access updated Metasploit Framework modules through msfupdate or by cloning the master branch from the GitHub repository.

The comprehensive nature of these exploit modules underscores the critical importance of maintaining current vulnerability patching protocols across enterprise infrastructure.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link