Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-25196 | screenshot-desktop vulnerable to command Injection via `format` option |
Github GHSA |
GHSA-gjx4-2c7g-fm94 | screenshot-desktop vulnerable to command Injection via `format` option |
Tue, 19 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 Aug 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | screenshot-desktop allows capturing a screenshot of your local machine. This vulnerability is a command injection issue. When user-controlled input is passed into the format option of the screenshot function, it is interpolated into a shell command without sanitization. This results in arbitrary command execution with the privileges of the calling process. This vulnerability is fixed in 1.15.2. | |
| Title | Command Injection via `format` option in screenshot-desktop | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-19T20:03:52.409Z
Reserved: 2025-08-12T16:15:30.237Z
Link: CVE-2025-55294
Updated: 2025-08-19T20:03:49.133Z
Status : Deferred
Published: 2025-08-19T18:15:29.140
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-55294
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA