CVE-2026-26725
Published: 20 February 2026
Summary
CVE-2026-26725 is a critical-severity Improper Privilege Management (CWE-269) vulnerability in Edubusinesssolutions Print Shop Pro Webdesk. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Employs least privilege to directly counter improper privilege management (CWE-269), preventing escalation via the AccessID parameter.
Enforces approved authorizations, blocking unauthorized privilege escalation through manipulation of the AccessID parameter.
Validates the AccessID parameter input to prevent remote attackers from tampering with it to achieve privilege escalation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of a public-facing web application via AccessID parameter manipulation (T1190) enables privilege escalation due to improper privilege management (T1068).
NVD Description
An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 (fixed in 19.76) allows a remote attacker to escalate privileges via the AccessID parameter.
Deeper analysisAI
CVE-2026-26725 is a privilege escalation vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18.34. The flaw allows a remote attacker to escalate privileges through manipulation of the AccessID parameter. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-269 (Improper Privilege Management). The vulnerability was published on 2026-02-20.
A remote attacker requires no privileges, authentication, or user interaction to exploit this issue over the network with low complexity. Successful exploitation enables the attacker to gain elevated privileges, resulting in high impacts on confidentiality, integrity, and availability of the affected system.
Further details on the vulnerability, including potential mitigation guidance, are available in the disclosure at https://github.com/chndlrx/vulnerability-disclosures/tree/main/CVE-2026-26725.
Details
- CWE(s)