CVE-2026-22035

Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.
Configurations

Configuration 1 (hide)

cpe:2.3:a:getgreenshot:greenshot:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-08 01:15

Updated : 2026-01-27 19:11


NVD link : CVE-2026-22035

Mitre link : CVE-2026-22035

CVE.ORG link : CVE-2026-22035


JSON object : View

Products Affected

getgreenshot

  • greenshot
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')