Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26725: n/a

0
Unknown
VulnerabilityCVE-2026-26725cvecve-2026-26725
Published: Fri Feb 20 2026 (02/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

AI-Powered Analysis

AILast updated: 02/20/2026, 16:44:37 UTC

Technical Analysis

CVE-2026-26725 is a security vulnerability identified in edu Business Solutions Print Shop Pro WebDesk version 18.34. The vulnerability arises from improper handling of the AccessID parameter, which can be manipulated by a remote attacker to escalate privileges within the application. Privilege escalation vulnerabilities allow attackers to gain higher-level permissions than intended, potentially leading to full system compromise or unauthorized access to sensitive data. The vulnerability is remote, meaning it can be exploited over the network without physical access. No CVSS score has been assigned yet, and no public exploits have been reported, indicating it may be newly discovered or not yet weaponized. The lack of patch or mitigation details suggests that vendors or users have not yet released fixes or workarounds. The affected software, Print Shop Pro WebDesk, is a web-based print management solution used in various organizations to manage print jobs and workflows. Exploiting this vulnerability could allow attackers to bypass access controls, modify print jobs, or gain administrative control over the system, potentially impacting confidentiality, integrity, and availability of print services and related data. Due to the nature of the vulnerability, exploitation likely does not require user interaction or prior authentication, increasing the risk profile. Organizations relying on this software should monitor for updates and consider restricting network access to the affected application until a patch is available.

Potential Impact

The primary impact of CVE-2026-26725 is unauthorized privilege escalation, which can lead to attackers gaining administrative or elevated access to the Print Shop Pro WebDesk environment. This can result in unauthorized modification or deletion of print jobs, exposure of sensitive documents, disruption of print services, and potential lateral movement within the affected network. For organizations that rely heavily on print management workflows, this could disrupt business operations and lead to data confidentiality breaches. The vulnerability's remote nature and lack of authentication requirements increase the risk of exploitation by external attackers. Additionally, if attackers gain administrative control, they could implant persistent backdoors or manipulate system configurations, further compromising organizational security. The absence of a patch or mitigation increases exposure time, potentially allowing attackers to develop exploits. Overall, the impact spans confidentiality, integrity, and availability, with significant operational and reputational risks for affected organizations worldwide.

Mitigation Recommendations

Until an official patch is released by edu Business Solutions, organizations should implement several specific mitigations: 1) Restrict network access to the Print Shop Pro WebDesk application using firewalls or network segmentation to limit exposure to trusted users and systems only. 2) Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the AccessID parameter or unusual privilege escalation attempts. 3) Monitor application logs and network traffic for anomalous activities related to AccessID parameter manipulation or privilege escalation indicators. 4) Enforce strong access controls and least privilege principles on the Print Shop Pro WebDesk environment to minimize potential damage if escalation occurs. 5) Conduct regular security assessments and penetration testing focused on the Print Shop Pro WebDesk to identify and remediate related vulnerabilities. 6) Educate IT and security teams about this vulnerability to ensure rapid response if exploitation attempts are detected. 7) Plan for rapid deployment of vendor patches once available and maintain up-to-date backups of critical print management configurations and data. These targeted actions go beyond generic advice by focusing on network-level controls, monitoring, and operational readiness specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69988bee2c4d84f260ae23db

Added to database: 2/20/2026, 4:29:34 PM

Last enriched: 2/20/2026, 4:44:37 PM

Last updated: 2/20/2026, 9:58:48 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats