This issue was fixed in version 2.8.33.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GREENmod uses named pipes for communication between plugins, the web portal, and the system service, but the access control lists for these pipes are configured incorrectly. This allows an attacker to communicate with the stream and upload any XML or JSON file, which will be processed by the named pipe with the privileges of the user under whose context the service is running. This allows for Server-Side Request Forgery to any Windows system on which the agent is installed and which provides communication via SMB or WebDav. This issue was fixed in version 2.8.33. | |
| Title | Server-Side Request Forgery in GREENmod | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-04-17T11:45:23.719Z
Reserved: 2026-03-30T09:39:43.884Z
Link: CVE-2026-5131
Updated: 2026-04-17T11:45:14.103Z
Status : Received
Published: 2026-04-17T11:16:11.000
Modified: 2026-04-17T11:16:11.000
Link: CVE-2026-5131
No data.
OpenCVE Enrichment
No data.