CVE-2025-61546: n/a
There is an issue on the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34 that enables remote attacker to create financial discrepancies by purchasing items with a negative quantity. This vulnerability is possible due to reliance on client-side input validation controls.
AI Analysis
Technical Summary
CVE-2025-61546 is a critical security vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The flaw exists in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint, which is responsible for calculating unit prices during the purchase process. The vulnerability arises because the application relies solely on client-side input validation to enforce quantity constraints, allowing remote attackers to submit negative quantities for items. This manipulation can cause the system to process transactions with negative values, leading to financial discrepancies such as unauthorized credits or refunds. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 score of 9.1 reflects the high impact on confidentiality and integrity, as attackers can alter financial data and potentially disrupt business operations. Although no known exploits are reported in the wild, the ease of exploitation and the critical nature of the flaw necessitate urgent attention. The root cause aligns with CWE-20, indicating improper input validation. Since the vulnerability affects a financial transaction endpoint, exploitation could result in significant monetary losses and damage to organizational trust. The lack of available patches at the time of disclosure emphasizes the need for immediate compensating controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a severe risk of financial fraud and operational disruption. Organizations using Print Shop Pro WebDesk for managing print service orders could experience unauthorized financial credits or manipulated billing, leading to direct monetary losses. The integrity of financial records and transactional data may be compromised, affecting accounting accuracy and audit compliance. Confidentiality is also impacted as attackers could infer pricing and purchasing patterns by manipulating requests. The lack of authentication requirement broadens the attack surface, allowing external threat actors to exploit the flaw remotely without insider access. This could undermine trust in financial systems and damage reputations, especially for public sector institutions and large enterprises relying on this software. The vulnerability could also facilitate further attacks by enabling attackers to create financial inconsistencies that mask other malicious activities. Given the critical CVSS score and the financial nature of the flaw, the potential impact on European businesses and government agencies is substantial.
Mitigation Recommendations
Immediate mitigation should focus on implementing robust server-side input validation to enforce quantity constraints, ensuring that negative values are rejected regardless of client input. Organizations should monitor transaction logs for unusual patterns such as negative quantity submissions or unexpected credits. Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable endpoint. Conduct thorough audits of recent transactions to identify and rectify any financial discrepancies caused by exploitation attempts. Engage with edu Business Solutions for timely patch releases and apply updates as soon as they become available. Additionally, restrict access to the vulnerable endpoint through network segmentation or IP whitelisting where feasible. Educate staff about the vulnerability and encourage vigilance for any anomalies in billing or order processing. Finally, integrate anomaly detection tools that can flag irregular purchase behaviors indicative of exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-61546: n/a
Description
There is an issue on the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34 that enables remote attacker to create financial discrepancies by purchasing items with a negative quantity. This vulnerability is possible due to reliance on client-side input validation controls.
AI-Powered Analysis
Technical Analysis
CVE-2025-61546 is a critical security vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The flaw exists in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint, which is responsible for calculating unit prices during the purchase process. The vulnerability arises because the application relies solely on client-side input validation to enforce quantity constraints, allowing remote attackers to submit negative quantities for items. This manipulation can cause the system to process transactions with negative values, leading to financial discrepancies such as unauthorized credits or refunds. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 score of 9.1 reflects the high impact on confidentiality and integrity, as attackers can alter financial data and potentially disrupt business operations. Although no known exploits are reported in the wild, the ease of exploitation and the critical nature of the flaw necessitate urgent attention. The root cause aligns with CWE-20, indicating improper input validation. Since the vulnerability affects a financial transaction endpoint, exploitation could result in significant monetary losses and damage to organizational trust. The lack of available patches at the time of disclosure emphasizes the need for immediate compensating controls and monitoring.
Potential Impact
For European organizations, this vulnerability poses a severe risk of financial fraud and operational disruption. Organizations using Print Shop Pro WebDesk for managing print service orders could experience unauthorized financial credits or manipulated billing, leading to direct monetary losses. The integrity of financial records and transactional data may be compromised, affecting accounting accuracy and audit compliance. Confidentiality is also impacted as attackers could infer pricing and purchasing patterns by manipulating requests. The lack of authentication requirement broadens the attack surface, allowing external threat actors to exploit the flaw remotely without insider access. This could undermine trust in financial systems and damage reputations, especially for public sector institutions and large enterprises relying on this software. The vulnerability could also facilitate further attacks by enabling attackers to create financial inconsistencies that mask other malicious activities. Given the critical CVSS score and the financial nature of the flaw, the potential impact on European businesses and government agencies is substantial.
Mitigation Recommendations
Immediate mitigation should focus on implementing robust server-side input validation to enforce quantity constraints, ensuring that negative values are rejected regardless of client input. Organizations should monitor transaction logs for unusual patterns such as negative quantity submissions or unexpected credits. Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable endpoint. Conduct thorough audits of recent transactions to identify and rectify any financial discrepancies caused by exploitation attempts. Engage with edu Business Solutions for timely patch releases and apply updates as soon as they become available. Additionally, restrict access to the vulnerable endpoint through network segmentation or IP whitelisting where feasible. Educate staff about the vulnerability and encourage vigilance for any anomalies in billing or order processing. Finally, integrate anomaly detection tools that can flag irregular purchase behaviors indicative of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695fe4622717593a336a2020
Added to database: 1/8/2026, 5:07:46 PM
Last enriched: 1/15/2026, 7:39:43 PM
Last updated: 2/7/2026, 10:41:33 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.