Metasploit Unveils New Modules and Pro Milestone
Basically, Metasploit added new tools to help test and improve security.
Metasploit has rolled out new modules for enhanced security testing. This update includes tools for reconnaissance, evasion, and exploitation. Cybersecurity professionals should act quickly to leverage these improvements and address potential vulnerabilities.
What Happened
On March 13, 2026, Metasploit? released its latest update, introducing three new modules aimed at enhancing security testing capabilities. These modules focus on reconnaissance, evasion, and exploitation, each designed to help security professionals identify vulnerabilities more effectively. Notably, the update includes a LeakIX-powered discovery tool that helps locate exposed services and leaked data, a Linux x64 RC4 payload packer for stealthy delivery, and an unauthenticated remote code execution (RCE) module targeting the SPIP Saisies plugin (CVE-2025-71243?).
The release also marks a significant milestone with the launch of Metasploit Pro 5.0.0, which features an updated user interface and support for single sign-on (SSO). This version aims to streamline penetration testing processes, making it easier for users to navigate and utilize the platform's capabilities.
Who's Affected
The new modules are particularly relevant for cybersecurity professionals and organizations that rely on Metasploit? for penetration testing and vulnerability assessments. Users of the SPIP Saisies plugin should be particularly vigilant, as the newly introduced RCE? module could expose their systems to potential attacks if not patched. With the growing number of exposed services and leaked data, organizations must prioritize their security measures to mitigate risks associated with these vulnerabilities.
What Data Was Exposed
The LeakIX?-powered discovery module enhances the ability to uncover exposed services and leaked credentials, which could lead to unauthorized access if not properly secured. The RCE? module for the SPIP Saisies plugin specifically allows attackers to inject malicious PHP code, potentially compromising the integrity of affected systems. This highlights the importance of maintaining up-to-date security practices and monitoring for vulnerabilities that could be exploited.
What You Should Do
To safeguard against these new threats, users should:
- Update to the latest Metasploit Framework using the command
msfupdateto ensure access to the new modules and enhancements. - Monitor for updates regarding the SPIP Saisies plugin and apply patches as soon as they become available to mitigate the RCE? vulnerability.
- Implement robust security measures such as regular vulnerability assessments and penetration testing to identify and address potential weaknesses in their systems.
By staying informed and proactive, organizations can better protect themselves against the evolving landscape of cyber threats.
Rapid7 Blog