Server-Side Request Forgery Vulnerability in GREENmod by Nomios
CVE-2026-5131

6.9MEDIUM

Key Information:

Status
Vendor
CVE Published:
17 April 2026

What is CVE-2026-5131?

GREENmod utilizes named pipes for communication between its various plugins, the web portal, and system service. However, due to improperly configured access control lists for these named pipes, an attacker can exploit this vulnerability. This exploitation allows for unauthorized communication with the named pipe stream, enabling the upload of any XML or JSON file. Once uploaded, the content is processed with the service's operating user privileges. This flaw permits Server-Side Request Forgery attacks against any Windows system where the GREENmod agent is installed, specifically impacting systems that communicate via SMB or WebDav protocols. A fix was introduced in version 2.8.33.

Affected Version(s)

GREENmod 0 < 2.8.33

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marcin Ressel
.