CVE-2025-61549: n/a
CVE-2025-61549 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18. 34. It arises from improper sanitization of the LoginID parameter on the /PSP/app/web/reg/reg_display. asp endpoint, allowing attackers to inject arbitrary JavaScript. Exploitation requires user interaction and no authentication, potentially leading to session hijacking or user impersonation. Although no known exploits are currently reported in the wild, the vulnerability poses a confidentiality and integrity risk. European organizations using this software, especially in sectors relying on Print Shop Pro WebDesk, should prioritize mitigation. Countries with higher adoption of this product and significant print service infrastructures are at greater risk. Mitigation involves input validation, output encoding, and applying patches once available. Monitoring and user awareness can reduce exploitation likelihood.
AI Analysis
Technical Summary
CVE-2025-61549 identifies a reflected Cross-Site Scripting (XSS) vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18.34, specifically affecting the LoginID parameter on the /PSP/app/web/reg/reg_display.asp endpoint. The vulnerability stems from the failure to properly sanitize user-supplied input, which is reflected in HTTP responses without adequate HTML encoding or escaping. This flaw allows attackers to craft malicious URLs containing JavaScript payloads that execute in the context of a victim’s browser session when the victim interacts with the crafted link. The vulnerability is classified under CWE-79, indicating a classic XSS issue. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), the attack can be launched remotely over the network without privileges but requires user interaction, such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire web application session. The impact includes limited confidentiality and integrity loss, such as theft of session cookies, user impersonation, or manipulation of displayed content, but does not affect availability. No patches are currently listed, and no known exploits have been reported in the wild, but the medium CVSS score of 6.1 reflects a moderate risk that should be addressed proactively.
Potential Impact
For European organizations using edu Business Solutions Print Shop Pro WebDesk version 18.34, this vulnerability could enable attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of legitimate users. This is particularly concerning for organizations handling confidential print jobs, client data, or internal workflows through this platform. The reflected XSS could facilitate phishing campaigns or lateral movement within networks if attackers leverage stolen credentials. While availability is not impacted, the compromise of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR breaches), and operational disruptions. Sectors such as government, education, and large enterprises that rely on Print Shop Pro for document management and printing services are at higher risk. The requirement for user interaction means social engineering could be a vector, increasing the threat in environments with less security awareness.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the LoginID parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Monitor web server logs for suspicious requests targeting the vulnerable endpoint. Educate users about the risks of clicking unknown links, especially those related to print service portals. Since no official patches are currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the affected endpoint. Regularly review and update security configurations of the Print Shop Pro WebDesk environment. Engage with the vendor to obtain patches or updates addressing this vulnerability. Conduct penetration testing and vulnerability scanning to verify remediation effectiveness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-61549: n/a
Description
CVE-2025-61549 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18. 34. It arises from improper sanitization of the LoginID parameter on the /PSP/app/web/reg/reg_display. asp endpoint, allowing attackers to inject arbitrary JavaScript. Exploitation requires user interaction and no authentication, potentially leading to session hijacking or user impersonation. Although no known exploits are currently reported in the wild, the vulnerability poses a confidentiality and integrity risk. European organizations using this software, especially in sectors relying on Print Shop Pro WebDesk, should prioritize mitigation. Countries with higher adoption of this product and significant print service infrastructures are at greater risk. Mitigation involves input validation, output encoding, and applying patches once available. Monitoring and user awareness can reduce exploitation likelihood.
AI-Powered Analysis
Technical Analysis
CVE-2025-61549 identifies a reflected Cross-Site Scripting (XSS) vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18.34, specifically affecting the LoginID parameter on the /PSP/app/web/reg/reg_display.asp endpoint. The vulnerability stems from the failure to properly sanitize user-supplied input, which is reflected in HTTP responses without adequate HTML encoding or escaping. This flaw allows attackers to craft malicious URLs containing JavaScript payloads that execute in the context of a victim’s browser session when the victim interacts with the crafted link. The vulnerability is classified under CWE-79, indicating a classic XSS issue. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), the attack can be launched remotely over the network without privileges but requires user interaction, such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire web application session. The impact includes limited confidentiality and integrity loss, such as theft of session cookies, user impersonation, or manipulation of displayed content, but does not affect availability. No patches are currently listed, and no known exploits have been reported in the wild, but the medium CVSS score of 6.1 reflects a moderate risk that should be addressed proactively.
Potential Impact
For European organizations using edu Business Solutions Print Shop Pro WebDesk version 18.34, this vulnerability could enable attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of legitimate users. This is particularly concerning for organizations handling confidential print jobs, client data, or internal workflows through this platform. The reflected XSS could facilitate phishing campaigns or lateral movement within networks if attackers leverage stolen credentials. While availability is not impacted, the compromise of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR breaches), and operational disruptions. Sectors such as government, education, and large enterprises that rely on Print Shop Pro for document management and printing services are at higher risk. The requirement for user interaction means social engineering could be a vector, increasing the threat in environments with less security awareness.
Mitigation Recommendations
Organizations should implement strict input validation and output encoding on the LoginID parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Monitor web server logs for suspicious requests targeting the vulnerable endpoint. Educate users about the risks of clicking unknown links, especially those related to print service portals. Since no official patches are currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the affected endpoint. Regularly review and update security configurations of the Print Shop Pro WebDesk environment. Engage with the vendor to obtain patches or updates addressing this vulnerability. Conduct penetration testing and vulnerability scanning to verify remediation effectiveness.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-09-26T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 695fe4622717593a336a2029
Added to database: 1/8/2026, 5:07:46 PM
Last enriched: 1/15/2026, 7:51:13 PM
Last updated: 2/6/2026, 1:04:41 AM
Views: 26
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1971: Cross Site Scripting in Edimax BR-6288ACL
MediumCVE-2026-23623: CWE-285: Improper Authorization in CollaboraOnline online
MediumCVE-2025-32393: CWE-770: Allocation of Resources Without Limits or Throttling in Significant-Gravitas AutoGPT
HighCVE-2026-24302: CWE-284: Improper Access Control in Microsoft Azure ARC
HighCVE-2026-24300: CWE-284: Improper Access Control in Microsoft Azure Front Door
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.