Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61549: n/a

0
Medium
VulnerabilityCVE-2025-61549cvecve-2025-61549
Published: Thu Jan 08 2026 (01/08/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Cross-Site Scripting (XSS) is present on the LoginID parameter on the /PSP/app/web/reg/reg_display.asp endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34. Unsanitized user input is reflected in HTTP responses without proper HTML encoding or escaping. This allows attackers to execute arbitrary JavaScript in the context of a victim s browser session

AI-Powered Analysis

AILast updated: 01/08/2026, 17:22:39 UTC

Technical Analysis

CVE-2025-61549 is a reflected Cross-Site Scripting (XSS) vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The vulnerability resides in the LoginID parameter of the /PSP/app/web/reg/reg_display.asp endpoint, where user-supplied input is not properly sanitized or encoded before being reflected in the HTTP response. This lack of input validation and output encoding allows attackers to inject malicious JavaScript code that executes within the victim's browser session. The attack vector involves crafting a specially formed URL or HTTP request containing the malicious payload in the LoginID parameter, which when accessed by a victim, executes the injected script. This can lead to session hijacking, theft of authentication tokens, redirection to malicious sites, or other client-side attacks. The vulnerability does not require authentication or user interaction beyond visiting a malicious link, increasing its exploitation potential. No CVSS score has been assigned yet, and no public exploits have been reported, but the vulnerability is publicly disclosed and should be considered a significant risk. The affected software is used primarily in print shop management environments, which may handle sensitive business and customer data. The absence of patches or official mitigation guidance at this time necessitates immediate defensive measures such as input validation, output encoding, and deployment of web application firewalls to detect and block exploit attempts.

Potential Impact

For European organizations, exploitation of this XSS vulnerability could compromise the confidentiality and integrity of user sessions within the Print Shop Pro WebDesk application. Attackers could steal session cookies, impersonate legitimate users, or perform unauthorized actions within the affected web application. This could lead to unauthorized access to sensitive business data, disruption of print shop operations, and potential reputational damage. Given the web-based nature of the vulnerability, it could also serve as a vector for delivering further malware or phishing attacks targeting employees or customers. Organizations relying on this software for critical business processes may face operational disruptions and increased risk of data breaches. The impact is heightened in sectors where print shop services are integral to business workflows, such as publishing, marketing, and retail. Additionally, the vulnerability could be leveraged as part of broader attack campaigns targeting supply chains or service providers in Europe.

Mitigation Recommendations

To mitigate CVE-2025-61549, organizations should implement strict input validation on the LoginID parameter to ensure only expected characters are accepted. Employ robust output encoding or escaping techniques to neutralize any user-supplied data before reflecting it in HTTP responses. Deploy web application firewalls (WAFs) with rules specifically designed to detect and block XSS payloads targeting the vulnerable endpoint. Monitor web server logs and application behavior for unusual or suspicious requests involving the LoginID parameter. Educate users about the risks of clicking on untrusted links and encourage the use of security-aware browsing practices. Coordinate with edu Business Solutions to obtain patches or updates addressing this vulnerability as soon as they become available. In the interim, consider isolating or restricting access to the affected web application to trusted networks or VPNs to reduce exposure. Regularly review and update security policies to include XSS prevention best practices tailored to the organization's environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695fe4622717593a336a2029

Added to database: 1/8/2026, 5:07:46 PM

Last enriched: 1/8/2026, 5:22:39 PM

Last updated: 1/9/2026, 12:13:46 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats