Unrated severityOSV Advisory· Published Jan 8, 2026· Updated Feb 26, 2026
Greenshot Vulnerable to OS Command Injection via ExternalCommand Plugin
CVE-2026-22035
Description
Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/greenshot/greenshot/commit/5dedd5c9f0a9896fa0af1d4980d875a48bf432cbmitrex_refsource_MISC
- github.com/greenshot/greenshot/releases/tag/v1.3.311mitrex_refsource_MISC
- github.com/greenshot/greenshot/security/advisories/GHSA-7hvw-q8q5-gpmjmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.