Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61549: n/a

0
Medium
VulnerabilityCVE-2025-61549cvecve-2025-61549
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-61549 is a medium-severity reflected Cross-Site Scripting (XSS) vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18. 34. It arises from improper sanitization of the LoginID parameter on the /PSP/app/web/reg/reg_display. asp endpoint, allowing attackers to inject arbitrary JavaScript. Exploitation requires user interaction and no authentication, potentially leading to session hijacking or user impersonation. Although no known exploits are currently reported in the wild, the vulnerability poses a confidentiality and integrity risk. European organizations using this software, especially in sectors relying on Print Shop Pro WebDesk, should prioritize mitigation. Countries with higher adoption of this product and significant print service infrastructures are at greater risk. Mitigation involves input validation, output encoding, and applying patches once available. Monitoring and user awareness can reduce exploitation likelihood.

AI-Powered Analysis

AILast updated: 01/15/2026, 19:51:13 UTC

Technical Analysis

CVE-2025-61549 identifies a reflected Cross-Site Scripting (XSS) vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18.34, specifically affecting the LoginID parameter on the /PSP/app/web/reg/reg_display.asp endpoint. The vulnerability stems from the failure to properly sanitize user-supplied input, which is reflected in HTTP responses without adequate HTML encoding or escaping. This flaw allows attackers to craft malicious URLs containing JavaScript payloads that execute in the context of a victim’s browser session when the victim interacts with the crafted link. The vulnerability is classified under CWE-79, indicating a classic XSS issue. According to the CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N), the attack can be launched remotely over the network without privileges but requires user interaction, such as clicking a malicious link. The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire web application session. The impact includes limited confidentiality and integrity loss, such as theft of session cookies, user impersonation, or manipulation of displayed content, but does not affect availability. No patches are currently listed, and no known exploits have been reported in the wild, but the medium CVSS score of 6.1 reflects a moderate risk that should be addressed proactively.

Potential Impact

For European organizations using edu Business Solutions Print Shop Pro WebDesk version 18.34, this vulnerability could enable attackers to hijack user sessions, steal sensitive information, or perform actions on behalf of legitimate users. This is particularly concerning for organizations handling confidential print jobs, client data, or internal workflows through this platform. The reflected XSS could facilitate phishing campaigns or lateral movement within networks if attackers leverage stolen credentials. While availability is not impacted, the compromise of confidentiality and integrity could lead to reputational damage, regulatory non-compliance (e.g., GDPR breaches), and operational disruptions. Sectors such as government, education, and large enterprises that rely on Print Shop Pro for document management and printing services are at higher risk. The requirement for user interaction means social engineering could be a vector, increasing the threat in environments with less security awareness.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on the LoginID parameter to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Monitor web server logs for suspicious requests targeting the vulnerable endpoint. Educate users about the risks of clicking unknown links, especially those related to print service portals. Since no official patches are currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the affected endpoint. Regularly review and update security configurations of the Print Shop Pro WebDesk environment. Engage with the vendor to obtain patches or updates addressing this vulnerability. Conduct penetration testing and vulnerability scanning to verify remediation effectiveness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe4622717593a336a2029

Added to database: 1/8/2026, 5:07:46 PM

Last enriched: 1/15/2026, 7:51:13 PM

Last updated: 2/6/2026, 1:04:41 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats