CVE-2026-5131

MEDIUM

Server-Side Request Forgery in GREENmod

Title source: cna
STIX 2.1

Description

GREENmod uses named pipes for communication between plugins, the web portal, and the system service, but the access control lists for these pipes are configured incorrectly. This allows an attacker to communicate with the stream and upload any XML or JSON file, which will be processed by the named pipe with the privileges of the user under whose context the service is running. This allows for Server-Side Request Forgery to any Windows system on which the agent is installed and which provides communication via SMB or WebDav. This issue was fixed in version 2.8.33.

Scores

CVSS v4 6.9
EPSS 0.0002
EPSS Percentile 4.5%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (1)
Nomios Poland/GREENmod < 2.8.33
Published Apr 17, 2026
Tracked Since Apr 17, 2026