Description

GREENmod uses named pipes for communication between plugins, the web portal, and the system service, but the access control lists for these pipes are configured incorrectly. This allows an attacker to communicate with the stream and upload any XML or JSON file, which will be processed by the named pipe with the privileges of the user under whose context the service is running. This allows for Server-Side Request Forgery to any Windows system on which the agent is installed and which provides communication via SMB or WebDav. This issue was fixed in version 2.8.33.

INFO

Published Date :

2026-04-17T10:45:34.021Z

Last Modified :

2026-04-17T11:45:23.719Z

Source :

CERT-PL
AFFECTED PRODUCTS

The following products are affected by CVE-2026-5131 vulnerability.

Vendors Products
Nomios Poland
  • Greenmod
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-5131.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability