Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61548: n/a

0
Critical
VulnerabilityCVE-2025-61548cvecve-2025-61548
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL Injection is present on the hfInventoryDistFormID parameter in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34. Unsanitized user input is incorporated directly into SQL queries without proper parameterization or escaping. This vulnerability allows remote attackers to execute arbitrary SQL commands

AI-Powered Analysis

AILast updated: 01/08/2026, 17:22:55 UTC

Technical Analysis

CVE-2025-61548 is a SQL Injection vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34, specifically affecting the hfInventoryDistFormID parameter within the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint. The root cause is the direct incorporation of unsanitized user input into SQL queries without proper parameterization or escaping. This flaw enables remote attackers to inject arbitrary SQL commands, potentially leading to unauthorized data retrieval, data manipulation, or even full compromise of the underlying database. The vulnerability is exploitable remotely without authentication, simply by sending crafted HTTP requests to the vulnerable endpoint. Although no public exploits have been reported yet, the lack of input validation and the critical nature of SQL Injection vulnerabilities make this a significant risk. The affected software is used primarily in print shop management within educational and business environments, which may contain sensitive operational and customer data. The absence of patches or official remediation guidance increases the urgency for organizations to implement interim protective measures. The vulnerability was reserved in late 2025 and published in early 2026, indicating recent discovery and disclosure. The lack of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to confidentiality, integrity, and availability of data managed by Print Shop Pro WebDesk. Exploitation could lead to unauthorized access to sensitive customer and business data, manipulation of pricing or inventory information, and potential disruption of print service operations. Educational institutions and businesses relying on this software for print management may face operational downtime, reputational damage, and regulatory compliance issues, especially under GDPR requirements for data protection. The ability to execute arbitrary SQL commands remotely without authentication increases the attack surface and potential for widespread exploitation. Additionally, compromised systems could serve as pivot points for further network intrusion. The lack of known exploits currently provides a limited window for proactive defense, but the vulnerability's nature suggests high potential impact if weaponized.

Mitigation Recommendations

Organizations should immediately audit their use of edu Business Solutions Print Shop Pro WebDesk version 18.34 and identify instances of the vulnerable endpoint. Since no official patches are available, implement strict input validation and sanitization on the hfInventoryDistFormID parameter at the application or web server level. Employ web application firewalls (WAFs) with custom rules to detect and block SQL Injection patterns targeting this endpoint. Review and restrict database permissions to minimize the impact of potential injection attacks, ensuring the application uses least privilege principles. Monitor logs for unusual database queries or repeated failed attempts to access the vulnerable endpoint. Engage with the vendor for updates on patches or official remediation. Consider isolating or segmenting affected systems to limit lateral movement in case of compromise. Conduct security awareness training for staff to recognize and report suspicious activity related to print service applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe4622717593a336a2026

Added to database: 1/8/2026, 5:07:46 PM

Last enriched: 1/8/2026, 5:22:55 PM

Last updated: 1/9/2026, 12:15:31 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats