Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61547: n/a

0
Medium
VulnerabilityCVE-2025-61547cvecve-2025-61547
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-Site Request Forgery (CSRF) is present on all functions in edu Business Solutions Print Shop Pro WebDesk version 18.34 (fixed in 19.76). The application does not implement proper CSRF tokens or other other protective measures, allowing a remote attacker to trick authenticated users into unknowingly executing unintended actions within their session. This can lead to unauthorized data modification such as credential updates.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 11:06:19 UTC

Technical Analysis

CVE-2025-61547 is a Cross-Site Request Forgery (CSRF) vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The vulnerability arises because the application does not implement proper CSRF tokens or other anti-CSRF mechanisms across all its functions. CSRF attacks exploit the trust a web application has in an authenticated user by tricking the user into submitting unauthorized requests, often via malicious links or embedded content. In this case, an attacker can craft a request that, when executed by an authenticated user, causes unintended actions such as modifying credentials or other sensitive data within the user's session. The vulnerability does not require the attacker to be authenticated but does require the victim user to interact with the malicious content (user interaction). The CVSS v3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality and integrity but no impact on availability. The attack vector is network-based, with high attack complexity due to the need for user interaction. The vulnerability affects all functions of the vulnerable version, increasing the attack surface. The issue was resolved in version 19.76 by implementing proper CSRF protections. No known exploits have been reported in the wild, but the lack of protection poses a significant risk if exploited. The CWE identifier is CWE-352, which corresponds to Cross-Site Request Forgery.

Potential Impact

For European organizations using edu Business Solutions Print Shop Pro WebDesk version 18.34, this vulnerability can lead to unauthorized modification of sensitive data, including credential updates. Such unauthorized changes can result in account compromise, unauthorized access escalation, and potential data breaches. The integrity and confidentiality of organizational data are at risk, potentially affecting business operations and trust. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to exploit it, increasing the risk in environments with less user security awareness. The absence of availability impact means systems remain operational, but the integrity and confidentiality risks are significant. Organizations in sectors relying heavily on print shop management and document workflows may face operational disruptions or reputational damage if exploited. The medium severity score indicates a moderate but actionable threat that should be addressed promptly to avoid exploitation.

Mitigation Recommendations

The primary mitigation is to upgrade edu Business Solutions Print Shop Pro WebDesk to version 19.76 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, organizations should implement compensating controls such as web application firewalls (WAFs) configured to detect and block CSRF attack patterns. Enforce strict Content Security Policies (CSP) to limit the execution of malicious scripts. Educate users about the risks of clicking on suspicious links or interacting with untrusted content to reduce the likelihood of successful social engineering. Additionally, implement multi-factor authentication (MFA) to reduce the impact of credential compromise. Regularly audit and monitor logs for unusual activity indicative of CSRF exploitation attempts. Developers should review and enhance the application’s security by integrating anti-CSRF tokens or same-site cookie attributes to prevent unauthorized requests. Conduct penetration testing focused on CSRF to validate the effectiveness of mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe4622717593a336a2023

Added to database: 1/8/2026, 5:07:46 PM

Last enriched: 2/11/2026, 11:06:19 AM

Last updated: 3/24/2026, 12:33:54 AM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses