## https://sploitus.com/exploit?id=245844D8-68C7-5306-95CC-668330FB0480
# CVE-2025-5309 Scanner
๐จ **CVE-2025-5309**: Server-Side Template Injection in Remote Support and Privileged Remote Access Chat Feature
## ๐ฐ CVE Overview
A vulnerability in BeyondTrust Remote Support and Privileged Remote Access allows Server-Side Template Injection (SSTI), potentially leading to remote code execution via the chat feature.
- **CVE**: CVE-2025-5309
- **Risk**: High (Remote Code Execution)
- **Credit**: Jorren Geurts โ [resillion.com](https://resillion.com/latest-news/be)
- **Searchable Services**: Over 1.2M services found on [hunter.how](https://hunter.how/list?searchVal=BeyondTrust)
- **Query**:
```
product.name="BeyondTrust Remote Support"||product.name="BeyondTrust Privileged Remote Access"
```
## ๐ก๏ธ How to Fix
- Update to the latest secure version from [BeyondTrust](https://beyondtrust.com/trust-center/security-advisories)
- Disable or restrict public access to the chat system
- Monitor and restrict template processing in chat input
## ๐ Usage
Install dependencies:
```bash
pip install -r requirements.txt
```
Run the scanner:
```bash
python3 scanner.py --query "BeyondTrust"
```
## ๐ก Example Output
```
๐จ CVE-2025-5309 Scanner by Issam junior ๐จ
[+] Searching for: BeyondTrust ...
[!] Possible vulnerable service found: 192.168.0.55:443
```
## ๐ Disclaimer
This tool is for **educational and security research purposes only**.