Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61546: n/a

0
Unknown
VulnerabilityCVE-2025-61546cvecve-2025-61546
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

There is an issue on the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34 that enables remote attacker to create financial discrepancies by purchasing items with a negative quantity. This vulnerability is possible due to reliance on client-side input validation controls.

AI-Powered Analysis

AILast updated: 01/08/2026, 17:23:35 UTC

Technical Analysis

CVE-2025-61546 is a security vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The flaw exists in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint, which is responsible for calculating unit prices during the purchase process. The vulnerability arises because the application relies solely on client-side input validation to enforce quantity constraints. Attackers can bypass these controls and submit negative quantities for items, causing the system to process transactions with negative values. This can lead to financial discrepancies such as unauthorized credits, refunds, or manipulation of accounting records. The vulnerability does not require authentication or user interaction, making it remotely exploitable by any attacker aware of the endpoint. No CVSS score has been assigned yet, and no patches or known exploits have been reported. The root cause is the lack of server-side validation to verify that quantities are positive integers before processing. This type of vulnerability can undermine the integrity of financial transactions and potentially lead to monetary losses or fraud. Organizations using this version of Print Shop Pro WebDesk should urgently review their input validation mechanisms and transaction logging to detect and prevent abuse.

Potential Impact

For European organizations, the primary impact of this vulnerability is financial loss due to manipulated transactions. Attackers exploiting the negative quantity input can create unauthorized credits or refunds, disrupting accounting and financial reporting. This can also lead to reputational damage if customers or partners become aware of fraudulent activities. Additionally, exploitation could undermine trust in the affected organization's e-commerce or internal purchasing systems. The vulnerability may also complicate compliance with financial regulations such as GDPR and local financial auditing standards, especially if financial data integrity is compromised. Organizations in sectors heavily reliant on print services or using edu Business Solutions software for order processing are at higher risk. The lack of authentication requirement and remote exploitability increase the threat level, potentially allowing widespread abuse if not mitigated promptly.

Mitigation Recommendations

1. Implement strict server-side validation to ensure that all quantity inputs are positive integers before processing any transaction. 2. Audit and monitor transaction logs for unusual patterns such as negative quantities or unexpected credits/refunds. 3. Apply input sanitization and validation at multiple layers, including API endpoints and backend services. 4. Restrict access to the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint using authentication and authorization controls where possible. 5. Develop and deploy patches or updates from the vendor as soon as they become available. 6. Conduct regular security assessments and penetration testing focusing on input validation and financial transaction workflows. 7. Educate staff and developers about the risks of relying solely on client-side validation. 8. Consider implementing anomaly detection systems to flag suspicious transaction activities in real-time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe4622717593a336a2020

Added to database: 1/8/2026, 5:07:46 PM

Last enriched: 1/8/2026, 5:23:35 PM

Last updated: 1/9/2026, 12:20:18 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats