INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 47m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 47m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 47m Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h
Vulnerabilities

CVE-2026-22035

High ⚡ Exploit Available
Greenshot OS Command Injection via Unsanitized Filename Processing (CVE-2026-22035)
CWE-78 — Weakness Type
Published: Jan 8, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.7
🔗 NVD Official
📄 Description (English)

Greenshot is an open source Windows screenshot utility. Versions 1.3.310 and below arvulnerable to OS Command Injection through unsanitized filename processing. The FormatArguments method in ExternalCommandDestination.cs:269 uses string.Format() to insert user-controlled filenames directly into shell commands without sanitization, allowing attackers to execute arbitrary commands by crafting malicious filenames containing shell metacharacters. This issue is fixed in version 1.3.311.

🤖 AI Executive Summary

Greenshot screenshot utility versions 1.3.310 and below contain a critical OS command injection vulnerability (CWE-78) through unsanitized filename processing in ExternalCommandDestination.cs. Attackers can execute arbitrary system commands by crafting malicious filenames with shell metacharacters, achieving code execution with user privileges. Active exploits exist and patches are available in version 1.3.311.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على أداة Greenshot لالتقاط لقطات الشاشة حيث تستخدم دالة FormatArguments في ExternalCommandDestination.cs الأسلوب string.Format() لإدراج أسماء الملفات التي يتحكم فيها المستخدم مباشرة في أوامر الصدفة دون تعقيم أو تحقق. يستغل المهاجمون هذا الضعف بإنشاء أسماء ملفات خبيثة تحتوي على محارف خاصة بصدفة النظام مثل الفواصل المنقوطة أو علامات الأنابيب أو علامات الدولار، مما يسمح بتنفيذ أوامر نظام تشغيل عشوائية. تصنف الثغرة بدرجة خطورة عالية (CVSS 7.7) وتتطلب تدخلاً فورياً لتحديث النظام إلى الإصدار 1.3.311 أو أحدث. وجود استغلالات نشطة يزيد من خطورة التهديد على المؤسسات التي تستخدم الإصدارات المتأثرة.

🤖 ملخص تنفيذي (AI)

تحتوي أداة لقطات الشاشة Greenshot الإصدارات 1.3.310 وما دونها على ثغرة حرجة لحقن أوامر نظام التشغيل (CWE-78) من خلال معالجة أسماء الملفات غير المعقمة في ExternalCommandDestination.cs. يمكن للمهاجمين تنفيذ أوامر نظام عشوائية عبر صياغة أسماء ملفات خبيثة تحتوي على محارف صدفة النظام، مما يحقق تنفيذ التعليمات البرمجية بصلاحيات المستخدم. توجد استغلالات نشطة وتتوفر تصحيحات في الإصدار 1.3.311.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:58
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Greenshot for documentation, IT support, or business operations face immediate risk of system compromise through command injection attacks. Government entities, financial institutions, and healthcare providers under NCA and SAMA oversight must prioritize patching as this vulnerability enables lateral movement and data exfiltration within enterprise networks.
🏢 Affected Saudi Sectors
القطاع الحكومي القطاع المالي والمصرفي قطاع الرعاية الصحية قطاع التعليم قطاع الاتصالات وتقنية المعلومات قطاع الطاقة والمرافق القطاع الخاص والشركات
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately update Greenshot to version 1.3.311 or later on all endpoints through centralized patch management systems and verify successful deployment across the enterprise.
2. Conduct forensic analysis on systems running vulnerable versions to detect potential exploitation indicators including suspicious process executions, unusual network connections, or unauthorized file modifications in system logs.
3. Implement application whitelisting controls and restrict Greenshot's ability to execute external commands through Group Policy or endpoint security solutions until patching is complete, and review all custom external command configurations for security compliance.
🔧 خطوات المعالجة (العربية)
1. تحديث Greenshot فوراً إلى الإصدار 1.3.311 أو أحدث على جميع نقاط النهاية من خلال أنظمة إدارة التصحيحات المركزية والتحقق من نجاح النشر عبر المؤسسة.
2. إجراء تحليل جنائي رقمي على الأنظمة التي تشغل الإصدارات المتأثرة للكشف عن مؤشرات الاستغلال المحتملة بما في ذلك تنفيذ العمليات المشبوهة أو الاتصالات الشبكية غير العادية أو تعديلات الملفات غير المصرح بها في سجلات النظام.
3. تطبيق ضوابط القائمة البيضاء للتطبيقات وتقييد قدرة Greenshot على تنفيذ الأوامر الخارجية من خلال نهج المجموعة أو حلول أمن نقاط النهاية حتى اكتمال التصحيح، ومراجعة جميع تكوينات الأوامر الخارجية المخصصة للامتثال الأمني.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2: Vulnerability and Patch Management ECC-3-1: System and Application Hardening ECC-5-1: Security Event Logging and Monitoring ECC-1-3: Secure Software Development
🔵 SAMA CSF
CCC-4.1: Vulnerability Management CCC-5.2: Endpoint Security Controls CCC-6.3: Security Monitoring and Analysis CCC-2.4: Secure Configuration Management
🟡 ISO 27001:2022
A.12.6.1: Management of Technical Vulnerabilities A.14.2.5: Secure System Engineering Principles A.12.2.1: Controls Against Malware A.16.1.3: Reporting Information Security Weaknesses
📦 Affected Products / CPE 1 entries
getgreenshot:greenshot
📊 CVSS Score
7.7
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack VectorL — Low / Local
Attack ComplexityH — High
Privileges RequiredN — None / Network
User InteractionR — Required
ScopeC — Changed
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score7.7
CWECWE-78
EPSS0.05%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-08
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available patch-available CWE-78
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.