Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Mar 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Getgreenshot
Getgreenshot greenshot |
|
| CPEs | cpe:2.3:a:getgreenshot:greenshot:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Getgreenshot
Getgreenshot greenshot |
Fri, 20 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Greenshot
Greenshot greenshot |
|
| Vendors & Products |
Greenshot
Greenshot greenshot |
Fri, 20 Mar 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Greenshot is an open source Windows screenshot utility. Versions 1.3.312 and below have untrusted executable search path / binary hijacking vulnerability that allows a local attacker to execute arbitrary code when the affected Windows application launches explorer.exe without using an absolute path. The vulnerable behavior is triggered when the user double-clicks the application’s tray icon, which opens the directory containing the most recent screenshot captured by the application. By placing a malicious executable with the same name in a location searched prior to the legitimate Windows binary, an attacker can gain code execution in the context of the application. This issue did not have a patch at the time of publication. | |
| Title | Greenshot Vulnerable to OS Command Injection via ExternalCommand Plugin | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T03:55:58.579Z
Reserved: 2026-02-05T19:58:01.639Z
Link: CVE-2026-25792
Updated: 2026-03-20T15:59:23.580Z
Status : Analyzed
Published: 2026-03-20T11:18:01.753
Modified: 2026-03-23T15:51:14.620
Link: CVE-2026-25792
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:29:36Z