Ad

CVE-2026-25792

MEDIUM CVSS 3.1: 6.5 EPSS 0.01%
Updated Mar 23, 2026
Getgreenshot
Parameter Value
CVSS 6.5 (MEDIUM)
Affected Versions before 1.3.312
Type CWE-426
Vendor Getgreenshot
Public PoC No

Greenshot is an open source Windows screenshot utility. Versions 1.3.312 and below have untrusted executable search path / binary hijacking vulnerability that allows a local attacker to execute arbitrary code when the affected Windows application launches explorer.exe without using an absolute path. The vulnerable behavior is triggered when the user double-clicks the application’s tray icon, which opens the directory containing the most recent screenshot captured by the application.

By placing a malicious executable with the same name in a location searched prior to the legitimate Windows binary, an attacker can gain code execution in the context of the application. This issue did not have a patch at the time of publication.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
Low
Easy to exploit
Privileges Required
High
Admin privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Getgreenshot Greenshot
cpe:2.3:a:getgreenshot:greenshot:*:*:*:*:*:*:*:*
<= 1.3.312

Related Vulnerabilities