Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.
References
| Link | Resource |
|---|---|
| https://github.com/greenshot/greenshot/commit/5dedd5c9f0a9896fa0af1d4980d875a48bf432cb | Patch |
| https://github.com/greenshot/greenshot/releases/tag/v1.3.311 | Release Notes |
| https://github.com/greenshot/greenshot/security/advisories/GHSA-7hvw-q8q5-gpmj | Vendor Advisory Exploit |
| https://github.com/greenshot/greenshot/security/advisories/GHSA-7hvw-q8q5-gpmj | Vendor Advisory Exploit |
Configurations
History
No history.
Information
Published : 2026-01-08 01:15
Updated : 2026-01-27 19:11
NVD link : CVE-2026-22035
Mitre link : CVE-2026-22035
CVE.ORG link : CVE-2026-22035
JSON object : View
Products Affected
getgreenshot
- greenshot
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
