Browse all 4 CVE security advisories affecting imprintnext. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Imprintnext specializes in digital printing solutions, enabling businesses to manage and automate print workflows across enterprise environments. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been widely documented, the four CVEs associated with the platform highlight recurring issues in web application security and authentication mechanisms. These vulnerabilities typically allow attackers to compromise system integrity or escalate privileges, underscoring the need for robust input sanitization and secure session management in their software architecture.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-3599 | Riaxe Product Customizer <= 2.1.2 - Unauthenticated SQL Injection via 'options' Parameter Keys in product_data — Riaxe Product CustomizerCWE-89 | 7.5 | High | 2026-04-16 |
| CVE-2026-3595 | Riaxe Product Customizer <= 2.1.2 - Unauthenticated Arbitrary User Deletion via 'user_id' Parameter — Riaxe Product CustomizerCWE-862 | 5.3 | Medium | 2026-04-16 |
| CVE-2026-3596 | Riaxe Product Customizer <= 2.1.2 - Missing Authorization to Unauthenticated Arbitrary Options Update to Privilege Escalation via 'install-imprint' AJAX Action — Riaxe Product CustomizerCWE-862 | 9.8 | Critical | 2026-04-16 |
| CVE-2026-3594 | Riaxe Product Customizer <= 2.4 - Unauthenticated Sensitive Information Disclosure via '/orders' REST API Endpoint — Riaxe Product CustomizerCWE-200 | 5.3 | Medium | 2026-04-08 |
This page lists every published CVE security advisory associated with imprintnext. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.