CVE-2025-61548

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Print Shop Pro WebDesk allows remote attackers to execute arbitrary SQL commands by manipulating the hfInventoryDistFormID parameter. Attackers could potentially read, modify, or delete database contents, affecting all users of vulnerable versions.

💻 Affected Systems

Products:
  • edu Business Solutions Print Shop Pro WebDesk
Versions: version 18.34
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component accessible via HTTP/HTTPS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data theft, data destruction, or full system takeover via SQL command execution.

🟠

Likely Case

Data exfiltration from the database, including sensitive business information, user credentials, or financial data.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data reading from specific tables.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly exploited with automated tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Contact vendor for patch information. Apply parameterized queries or input validation to the hfInventoryDistFormID parameter in CartV12.aspx/GetUnitPrice endpoint.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns targeting the vulnerable endpoint.

Input Validation Filter

windows

Implement server-side validation to restrict hfInventoryDistFormID to expected values.

🧯 If You Can't Patch

  • Restrict network access to the vulnerable endpoint using firewall rules.
  • Implement database permissions to limit potential damage from SQL injection.

🔍 How to Verify

Check if Vulnerable:

Test the /PSP/appNET/Store/CartV12.aspx/GetUnitPrice endpoint with SQL injection payloads in hfInventoryDistFormID parameter.

Check Version:

Check application version in web interface or configuration files.

Verify Fix Applied:

Verify that parameterized queries are implemented and SQL injection attempts no longer succeed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL error messages in application logs
  • Multiple failed SQL injection attempts

Network Indicators:

  • HTTP requests to vulnerable endpoint with SQL keywords in parameters

SIEM Query:

source="web_logs" AND uri="/PSP/appNET/Store/CartV12.aspx/GetUnitPrice" AND (param="hfInventoryDistFormID" AND value CONTAINS "UNION" OR "SELECT" OR "INSERT" OR "DELETE")

🔗 References

📤 Share & Export