🔐 CVE Alert

CVE-2026-5131

UNKNOWN 0.0

Server-Side Request Forgery in GREENmod

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

GREENmod uses named pipes for communication between plugins, the web portal, and the system service, but the access control lists for these pipes are configured incorrectly. This allows an attacker to communicate with the stream and upload any XML or JSON file, which will be processed by the named pipe with the privileges of the user under whose context the service is running. This allows for Server-Side Request Forgery to any Windows system on which the agent is installed and which provides communication via SMB or WebDav. This issue was fixed in version 2.8.33.

CWE CWE-918
Vendor nomios poland
Product greenmod
Published Apr 17, 2026
Last Updated Apr 17, 2026
Stay Ahead of the Next One

Get instant alerts for nomios poland greenmod

Be the first to know when new unknown vulnerabilities affecting nomios poland greenmod are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Nomios Poland / GREENmod
0 < 2.8.33

References

NVD ↗ CVE.org ↗ EPSS Data ↗
nomios.pl: https://www.nomios.pl/greenmod/ cert.pl: https://cert.pl/posts/2026/04/CVE-2026-5131

Credits

Marcin Ressel