CVE-2025-61547

6.8 MEDIUM

📋 TL;DR

This CSRF vulnerability in edu Business Solutions Print Shop Pro WebDesk allows attackers to trick authenticated users into performing unintended actions within their sessions. All authenticated functions are vulnerable, potentially leading to unauthorized credential changes and data modification. Users of WebDesk version 18.34 are affected.

💻 Affected Systems

Products:
  • edu Business Solutions Print Shop Pro WebDesk
Versions: 18.34
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 18.34 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could change administrator credentials, take full control of the application, and modify all user data and system settings.

🟠

Likely Case

Attackers trick users into changing their own passwords or modifying their profile data, potentially leading to account takeover.

🟢

If Mitigated

With proper CSRF tokens and same-site cookie policies, the risk is reduced to zero as requests would be rejected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks require user interaction but are trivial to implement once the vulnerable endpoints are identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check vendor website for security updates. If available, apply the patch following vendor instructions.

🔧 Temporary Workarounds

Implement CSRF Protection Middleware

all

Add CSRF tokens to all state-changing requests and validate them server-side.

Implementation depends on web framework. For PHP: Use anti-CSRF libraries or implement token generation/validation.

SameSite Cookie Attribute

all

Set SameSite=Strict or SameSite=Lax on session cookies to prevent cross-site requests.

Set-Cookie: session=value; SameSite=Strict; Secure; HttpOnly

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with CSRF protection rules
  • Restrict application access to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check if application version is 18.34. Test forms for presence of CSRF tokens by inspecting HTML source.

Check Version:

Check application interface or configuration files for version information.

Verify Fix Applied:

Verify that all POST/PUT/DELETE requests include unique CSRF tokens that are validated server-side.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed state-changing requests from same user in short time
  • Requests missing expected CSRF tokens

Network Indicators:

  • Cross-origin POST requests to application endpoints
  • Requests with Referer headers pointing to external domains

SIEM Query:

source=web_logs AND (status=403 AND csrf_token_missing) OR (POST AND referer NOT LIKE '%yourdomain.com%')

🔗 References

📤 Share & Export