CVE-2026-26725

9.8 CRITICAL

📋 TL;DR

A privilege escalation vulnerability in edu Business Solutions Print Shop Pro WebDesk allows remote attackers to gain elevated privileges by manipulating the AccessID parameter. This affects organizations using the vulnerable software version for their print management systems. Attackers could potentially gain administrative access to the application.

💻 Affected Systems

Products:
  • edu Business Solutions Print Shop Pro WebDesk
Versions: v.18.34
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only version 18.34 is confirmed affected; other versions may also be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative control over the Print Shop Pro WebDesk system, allowing complete system compromise, data theft, and further network penetration.

🟠

Likely Case

Unauthorized users gain elevated privileges to access sensitive print management functions, modify configurations, or access restricted data.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the application; the GitHub reference contains technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

1. Contact edu Business Solutions for patch information
2. Monitor vendor communications for security updates
3. Apply any available patches immediately

🔧 Temporary Workarounds

Parameter Validation

all

Implement input validation for AccessID parameter to prevent unauthorized values

Network Segmentation

all

Restrict network access to Print Shop Pro WebDesk to authorized users only

🧯 If You Can't Patch

  • Implement web application firewall rules to block suspicious AccessID parameter manipulation
  • Enable detailed logging and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if running Print Shop Pro WebDesk version 18.34 and test AccessID parameter manipulation

Check Version:

Check application version in admin interface or configuration files

Verify Fix Applied:

Test privilege escalation attempts after applying mitigations to confirm they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual AccessID parameter values in web logs
  • Multiple failed privilege escalation attempts
  • Unexpected user privilege changes

Network Indicators:

  • HTTP requests with manipulated AccessID parameters
  • Unusual traffic patterns to print management endpoints

SIEM Query:

source="web_logs" AND (AccessID="*admin*" OR AccessID="*elevated*")

🔗 References

📤 Share & Export