Cyber Posture

CVE-2025-61546

CriticalPublic PoC

Published: 08 January 2026

Published
08 January 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0003 7.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-61546 is a critical-severity Improper Input Validation (CWE-20) vulnerability in Edubusinesssolutions Print Shop Pro Webdesk. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 7.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly enforces server-side validation of inputs like the quantity parameter to prevent processing of negative values that cause financial discrepancies.

prevent

Restricts the types, amounts, and characteristics of inputs such as requiring non-negative integers for quantity at the web endpoint.

prevent

Remediates the specific improper input validation flaw by patching to version 19.69 where the vulnerability is fixed.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1657 Financial Theft Impact
Adversaries may steal monetary resources from targets through extortion, social engineering, technical theft, or other methods aimed at their own financial gain at the expense of the availability of these resources for victims.
Why these techniques?

Improper input validation on public web endpoint directly enables remote exploitation of a business application (T1190) to manipulate pricing/credits for financial gain (T1657).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

There is an issue on the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint in edu Business Solutions Print Shop Pro WebDesk version 18.34 (fixed in 19.69) that enables remote attacker to create financial discrepancies by purchasing items with a negative quantity. This vulnerability is possible…

more

due to reliance on client-side input validation controls.

Deeper analysisAI

CVE-2025-61546 is an improper input validation vulnerability (CWE-20) in the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint of edu Business Solutions Print Shop Pro WebDesk version 18.34. It arises from reliance on client-side input validation controls, enabling a remote attacker to submit a negative quantity for items and create financial discrepancies during purchases. The issue has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N) and was published on 2026-01-08.

Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. By manipulating the quantity parameter to a negative value, attackers can achieve high impacts on confidentiality and integrity, specifically generating financial discrepancies such as altered pricing or unauthorized credits through the shopping cart functionality.

The vulnerability is addressed in Print Shop Pro WebDesk version 19.69. Additional details are available in the vulnerability disclosure at https://github.com/chndlrx/vulnerability-disclosures/tree/main/CVE-2025-61546.

Details

CWE(s)

Affected Products

edubusinesssolutions
print shop pro webdesk
18.34

CVEs Like This One

CVE-2026-26725Same product: Edubusinesssolutions Print Shop Pro Webdesk
CVE-2025-61548Same product: Edubusinesssolutions Print Shop Pro Webdesk
CVE-2026-4987Shared CWE-20
CVE-2026-20856Shared CWE-20
CVE-2025-1736Shared CWE-20
CVE-2025-67484Shared CWE-20
CVE-2026-2880Shared CWE-20
CVE-2025-1514Shared CWE-20
CVE-2025-20393Shared CWE-20
CVE-2025-59228Shared CWE-20

References