Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.
Metrics
Affected Vendors & Products
References
History
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Greenshot
Greenshot greenshot Microsoft Microsoft windows |
|
| Vendors & Products |
Greenshot
Greenshot greenshot Microsoft Microsoft windows |
Thu, 08 Jan 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311. | |
| Title | Greenshot Vulnerable to OS Command Injection via ExternalCommand Plugin | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-08T19:08:00.277Z
Reserved: 2026-01-05T22:30:38.719Z
Link: CVE-2026-22035
Updated: 2026-01-08T19:07:47.253Z
Status : Awaiting Analysis
Published: 2026-01-08T01:15:55.847
Modified: 2026-01-08T19:15:59.557
Link: CVE-2026-22035
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:47:39Z