MyScreenTools v2.2.1.0 contains a critical OS command injection vulnerability in the GIF compression tool. The application fails to properly sanitize user-supplied file paths before passing them to cmd.exe, allowing attackers to execute arbitrary system commands with the privileges of the user running the application. The vulnerability exists in the CMD() function within GIFSicleTool\Form_gif_sicle_tool.cs, which constructs shell commands by concatenating unsanitized user input (file paths) and executes them via cmd.exe.
References
| Link | Resource |
|---|---|
| https://github.com/cydtseng/Vulnerability-Research/blob/main/myscreentools/OSCommandInjection-GifCompression.md | Third Party Advisory Exploit Mitigation |
| https://github.com/luotengyuan/MyScreenTools/blob/master/GIFSicleTool/Form_gif_sicle_tool.cs | Product |
| https://github.com/luotengyuan/MyScreenTools/tree/master | Product |
Configurations
History
No history.
Information
Published : 2025-11-17 16:15
Updated : 2026-01-16 21:23
NVD link : CVE-2025-63916
Mitre link : CVE-2025-63916
CVE.ORG link : CVE-2025-63916
JSON object : View
Products Affected
luotengyuan
- myscreentools
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
