Cyber Posture

CVE-2026-26725

CriticalPublic PoC

Published: 20 February 2026

Published
20 February 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0023 46.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An issue in edu Business Solutions Print Shop Pro WebDesk v.18.34 allows a remote attacker to escalate privileges via the AccessID parameter.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Employs least privilege to directly counter improper privilege management (CWE-269), preventing escalation via the AccessID parameter.

prevent

Enforces approved authorizations, blocking unauthorized privilege escalation through manipulation of the AccessID parameter.

prevent

Validates the AccessID parameter input to prevent remote attackers from tampering with it to achieve privilege escalation.

Security SummaryAI

CVE-2026-26725 is a privilege escalation vulnerability in edu Business Solutions Print Shop Pro WebDesk version 18.34. The flaw allows a remote attacker to escalate privileges through manipulation of the AccessID parameter. It has been assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-269 (Improper Privilege Management). The vulnerability was published on 2026-02-20.

A remote attacker requires no privileges, authentication, or user interaction to exploit this issue over the network with low complexity. Successful exploitation enables the attacker to gain elevated privileges, resulting in high impacts on confidentiality, integrity, and availability of the affected system.

Further details on the vulnerability, including potential mitigation guidance, are available in the disclosure at https://github.com/chndlrx/vulnerability-disclosures/tree/main/CVE-2026-26725.

Details

CWE(s)

Affected Products

edubusinesssolutions
print shop pro webdesk
18.34

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Unauthenticated remote exploitation of a public-facing web application via AccessID parameter manipulation (T1190) enables privilege escalation due to improper privilege management (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References