๐Ÿ” CVE Alert

CVE-2026-22035

HIGH 7.8

Greenshot Vulnerable to OS Command Injection via ExternalCommand Plugin

CVSS Score
7.8
EPSS Score
0.0%
EPSS Percentile
0th

Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.

CWE CWE-78
Vendor greenshot
Product greenshot
Published Jan 8, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for greenshot greenshot

Be the first to know when new high vulnerabilities affecting greenshot greenshot are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

greenshot / greenshot
< 1.3.311

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/greenshot/greenshot/security/advisories/GHSA-7hvw-q8q5-gpmj github.com: https://github.com/greenshot/greenshot/commit/5dedd5c9f0a9896fa0af1d4980d875a48bf432cb github.com: https://github.com/greenshot/greenshot/releases/tag/v1.3.311