🛡️ Security Tools

Metasploit's April Arsenal: RCE for FreeScout, Grav CMS, and a Ghostly Windows Logon Trick

You're scripting a payload drop into a vulnerable web app. Suddenly, Metasploit's fresh modules light up your console — RCE in FreeScout via a sneaky .htaccess bypass. This week's wrap-up isn't just code; it's a blueprint for modern breaches.

Metasploit console showing new FreeScout RCE module execution

⚡ Key Takeaways

  • New RCE modules for FreeScout (unauth) and Grav CMS (auth) expand Metasploit's web attack surface. 𝕏
  • Generic HTTP os_cmd_exec catches broad misconfigs; Windows logon persistence via registry is stealthy. 𝕏
  • Contributor-driven updates highlight open-source speed — a persistent edge over closed tools. 𝕏
Published by

CVE Watch

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Rapid7 Blog

Stay in the loop

The week's most important stories from CVE Watch, delivered once a week.