Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61546: n/a

0
Critical
VulnerabilityCVE-2025-61546cvecve-2025-61546
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

There is an issue on the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34 that enables remote attacker to create financial discrepancies by purchasing items with a negative quantity. This vulnerability is possible due to reliance on client-side input validation controls.

AI-Powered Analysis

AILast updated: 01/15/2026, 19:39:43 UTC

Technical Analysis

CVE-2025-61546 is a critical security vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The flaw exists in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint, which is responsible for calculating unit prices during the purchase process. The vulnerability arises because the application relies solely on client-side input validation to enforce quantity constraints, allowing remote attackers to submit negative quantities for items. This manipulation can cause the system to process transactions with negative values, leading to financial discrepancies such as unauthorized credits or refunds. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 score of 9.1 reflects the high impact on confidentiality and integrity, as attackers can alter financial data and potentially disrupt business operations. Although no known exploits are reported in the wild, the ease of exploitation and the critical nature of the flaw necessitate urgent attention. The root cause aligns with CWE-20, indicating improper input validation. Since the vulnerability affects a financial transaction endpoint, exploitation could result in significant monetary losses and damage to organizational trust. The lack of available patches at the time of disclosure emphasizes the need for immediate compensating controls and monitoring.

Potential Impact

For European organizations, this vulnerability poses a severe risk of financial fraud and operational disruption. Organizations using Print Shop Pro WebDesk for managing print service orders could experience unauthorized financial credits or manipulated billing, leading to direct monetary losses. The integrity of financial records and transactional data may be compromised, affecting accounting accuracy and audit compliance. Confidentiality is also impacted as attackers could infer pricing and purchasing patterns by manipulating requests. The lack of authentication requirement broadens the attack surface, allowing external threat actors to exploit the flaw remotely without insider access. This could undermine trust in financial systems and damage reputations, especially for public sector institutions and large enterprises relying on this software. The vulnerability could also facilitate further attacks by enabling attackers to create financial inconsistencies that mask other malicious activities. Given the critical CVSS score and the financial nature of the flaw, the potential impact on European businesses and government agencies is substantial.

Mitigation Recommendations

Immediate mitigation should focus on implementing robust server-side input validation to enforce quantity constraints, ensuring that negative values are rejected regardless of client input. Organizations should monitor transaction logs for unusual patterns such as negative quantity submissions or unexpected credits. Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to block suspicious requests targeting the vulnerable endpoint. Conduct thorough audits of recent transactions to identify and rectify any financial discrepancies caused by exploitation attempts. Engage with edu Business Solutions for timely patch releases and apply updates as soon as they become available. Additionally, restrict access to the vulnerable endpoint through network segmentation or IP whitelisting where feasible. Educate staff about the vulnerability and encourage vigilance for any anomalies in billing or order processing. Finally, integrate anomaly detection tools that can flag irregular purchase behaviors indicative of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe4622717593a336a2020

Added to database: 1/8/2026, 5:07:46 PM

Last enriched: 1/15/2026, 7:39:43 PM

Last updated: 2/6/2026, 10:56:12 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats