CVE-2026-22035
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-78
Neutralización incorrecta de elementos especiales usados en un comando de sistema operativo (Inyección de comando de sistema operativo)
Fecha de publicación:
08/01/2026
Última modificación:
08/01/2026
Descripción
*** Pendiente de traducción *** Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.
Impacto
Puntuación base 3.x
7.70
Gravedad 3.x
ALTA
Referencias a soluciones, herramientas e información
- https://github.com/greenshot/greenshot/commit/5dedd5c9f0a9896fa0af1d4980d875a48bf432cb
- https://github.com/greenshot/greenshot/releases/tag/v1.3.311
- https://github.com/greenshot/greenshot/security/advisories/GHSA-7hvw-q8q5-gpmj
- https://github.com/greenshot/greenshot/security/advisories/GHSA-7hvw-q8q5-gpmj



