CVE-2026-22035
Greenshot · Greenshot Multiple Products
A high-severity vulnerability has been identified in the Greenshot screenshot utility for Windows.
Executive summary
A high-severity vulnerability has been identified in the Greenshot screenshot utility for Windows. An attacker could exploit this flaw by tricking a user into opening a specially crafted image file, which would allow the attacker to execute malicious code and potentially take control of the user's computer. This poses a significant risk to data confidentiality and system integrity, requiring immediate patching.
Vulnerability
This vulnerability is a remote code execution (RCE) flaw within the image file parsing component of Greenshot. An attacker can create a malicious image file (e.g., PNG, JPG) containing embedded shellcode. When a user opens this crafted file with Greenshot, a buffer overflow is triggered during the parsing process, which allows the attacker's embedded code to be executed on the victim's system with the privileges of the current user.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.7. Successful exploitation could allow an attacker to gain full control over an employee's workstation, leading to the installation of malware such as ransomware or spyware, theft of sensitive corporate data and credentials, or lateral movement across the network. As screenshot tools are commonly used to handle potentially sensitive information, this vulnerability presents a direct threat to endpoint security, data confidentiality, and overall network integrity.
Remediation
Immediate Action: Apply vendor security updates immediately across all workstations where Greenshot is installed. Prioritize patching for systems used by employees with access to sensitive information. After deployment, verify that the patch has been successfully applied and the software version is updated.
Proactive Monitoring: Monitor endpoint detection and response (EDR) logs for any suspicious child processes being spawned by Greenshot.exe (e.g., cmd.exe, powershell.exe). Review network logs for unusual outbound connections from workstations running Greenshot, which could indicate post-exploitation command and control (C2) activity. Review system access logs for any unauthorized activity originating from accounts on patched systems.
Compensating Controls: If patching cannot be performed immediately, consider implementing application control rules to prevent Greenshot.exe from launching command-line interpreters or making network connections. Educate users about the risk and instruct them not to open image files from untrusted or external sources with Greenshot until their system is patched.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the High severity (CVSS 7.7) of this remote code execution vulnerability, immediate action is required. Although this CVE is not currently on the CISA KEV list and no public exploits are available, the risk of an attacker gaining control of a system through a common user action like opening an image is significant. We strongly recommend prioritizing the deployment of the vendor-supplied security updates to all affected systems to mitigate this threat before it is actively exploited.