OS Command Injection in Greenshot Screenshot Utility
CVE-2026-22035
7.8HIGH
What is CVE-2026-22035?
Greenshot, an open source screenshot utility for Windows, is susceptible to OS Command Injection due to unsanitized filename processing in versions 1.3.310 and earlier. The issue arises when user-controlled filenames are directly inserted into shell commands via the FormatArguments method, enabling attackers to execute arbitrary code by crafting malicious filenames that include shell metacharacters. This vulnerability has been addressed in version 1.3.311, which implements proper sanitization measures.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
greenshot < 1.3.311
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
