| CVE ID | CVE-2026-5131 |
| Publication date | 17 April 2026 |
| Vendor | Nomios Poland |
| Product | GREENmod |
| Vulnerable versions | All before 2.8.33 |
| Vulnerability type (CWE) | Server-Side Request Forgery (SSRF) (CWE-918) |
| Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerability in GREENmod software and participated in coordination of its disclosure.
The vulnerability CVE-2026-5131: GREENmod uses named pipes for communication between plugins, the web portal, and the system service, but the access control lists for these pipes are configured incorrectly. This allows an attacker to communicate with the stream and upload any XML or JSON file, which will be processed by the named pipe with the privileges of the user under whose context the service is running. This allows for Server-Side Request Forgery to any Windows system on which the agent is installed and which provides communication via SMB or WebDav.
This issue was fixed in version 2.8.33.
Credits
We thank Marcin Ressel for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.