CVE-2026-33156

ScreenToGif · ScreenToGif

A high-severity vulnerability in ScreenToGif, a popular screen recording tool, could allow for unauthorized code execution on the user's system.

Executive summary

A security flaw in ScreenToGif could allow attackers to compromise user workstations through malicious file processing or recording interactions.

Vulnerability

ScreenToGif contains a vulnerability in its core recording or file export functionality. The CVSS score of 7.8 indicates a high-severity risk, likely involving a buffer overflow or improper handling of media files that could lead to arbitrary code execution when a user processes a specially crafted file.

Business impact

Successful exploitation could lead to the compromise of individual employee workstations, potentially serving as an entry point for further network penetration. Given the widespread use of such tools for documentation, the risk of a targeted attack using a malicious project file is significant.

Remediation

Immediate Action: Update ScreenToGif to the latest version immediately and advise users to avoid opening project files from untrusted sources.

Proactive Monitoring: Monitor for suspicious child processes spawned by the ScreenToGif executable and audit file creation in temporary directories.

Compensating Controls: Use application whitelisting or AppLocker to restrict the execution of unauthorized binaries and ensure that antivirus signatures are up to date.

Exploitation status

Public Exploit Available: false

Analyst recommendation

We recommend that organizations update ScreenToGif across all workstations to the latest secure version. Additionally, users should be reminded of the risks associated with processing files from unknown or external sources.