Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 27 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgreenshot
Getgreenshot greenshot |
|
| CPEs | cpe:2.3:a:getgreenshot:greenshot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Getgreenshot
Getgreenshot greenshot |
Thu, 08 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Greenshot
Greenshot greenshot Microsoft Microsoft windows |
|
| Vendors & Products |
Greenshot
Greenshot greenshot Microsoft Microsoft windows |
Thu, 08 Jan 2026 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311. | |
| Title | Greenshot Vulnerable to OS Command Injection via ExternalCommand Plugin | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T15:04:55.208Z
Reserved: 2026-01-05T22:30:38.719Z
Link: CVE-2026-22035
Updated: 2026-01-08T19:07:47.253Z
Status : Analyzed
Published: 2026-01-08T01:15:55.847
Modified: 2026-01-27T19:11:58.087
Link: CVE-2026-22035
No data.
OpenCVE Enrichment
Updated: 2026-04-18T08:00:05Z