Share
## https://sploitus.com/exploit?id=245844D8-68C7-5306-95CC-668330FB0480
# CVE-2025-5309 Scanner

๐Ÿšจ **CVE-2025-5309**: Server-Side Template Injection in Remote Support and Privileged Remote Access Chat Feature

## ๐Ÿ“ฐ CVE Overview
A vulnerability in BeyondTrust Remote Support and Privileged Remote Access allows Server-Side Template Injection (SSTI), potentially leading to remote code execution via the chat feature.

- **CVE**: CVE-2025-5309
- **Risk**: High (Remote Code Execution)
- **Credit**: Jorren Geurts โ€“ [resillion.com](https://resillion.com/latest-news/be)
- **Searchable Services**: Over 1.2M services found on [hunter.how](https://hunter.how/list?searchVal=BeyondTrust)
- **Query**:
  ```
  product.name="BeyondTrust Remote Support"||product.name="BeyondTrust Privileged Remote Access"
  ```

## ๐Ÿ›ก๏ธ How to Fix
- Update to the latest secure version from [BeyondTrust](https://beyondtrust.com/trust-center/security-advisories)
- Disable or restrict public access to the chat system
- Monitor and restrict template processing in chat input

## ๐Ÿ” Usage

Install dependencies:

```bash
pip install -r requirements.txt
```

Run the scanner:

```bash
python3 scanner.py --query "BeyondTrust"
```

## ๐Ÿ’ก Example Output

```
๐Ÿšจ CVE-2025-5309 Scanner by Issam junior ๐Ÿšจ
[+] Searching for: BeyondTrust ...
[!] Possible vulnerable service found: 192.168.0.55:443
```

## ๐Ÿ“Œ Disclaimer
This tool is for **educational and security research purposes only**.