Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a server-side request forgery (SSRF) vulnerability. The `console_release` directory is reachable from the internet without any authentication. Inside that directory are dozens of PHP scripts that build URLs from user‑controlled values and then invoke either 'curl_exec()` or `file_get_contents()` without proper validation. Although many files attempt to mitigate SSRF by calling `filter_var', the checks are incomplete. Because the endpoint is unauthenticated, any remote attacker can supply a hostname and cause the server to issue requests to internal resources. This enables internal network reconnaissance, potential pivoting, or data exfiltration. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
History

Tue, 30 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host
Vendors & Products Vasion
Vasion virtual Appliance Application
Vasion virtual Appliance Host

Mon, 29 Sep 2025 20:45:00 +0000

Type Values Removed Values Added
Description Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a server-side request forgery (SSRF) vulnerability. The `console_release` directory is reachable from the internet without any authentication. Inside that directory are dozens of PHP scripts that build URLs from user‑controlled values and then invoke either 'curl_exec()` or `file_get_contents()` without proper validation. Although many files attempt to mitigate SSRF by calling `filter_var', the checks are incomplete. Because the endpoint is unauthenticated, any remote attacker can supply a hostname and cause the server to issue requests to internal resources. This enables internal network reconnaissance, potential pivoting, or data exfiltration. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
Title Vasion Print (formerly PrinterLogic) SSRF via console_release Directory
Weaknesses CWE-306
CWE-918
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-09-29T20:39:49.179Z

Updated: 2025-09-30T13:42:32.556Z

Reserved: 2025-04-15T19:15:22.574Z

Link: CVE-2025-34225

cve-icon Vulnrichment

Updated: 2025-09-30T13:33:02.494Z

cve-icon NVD

Status : Received

Published: 2025-09-29T21:15:36.330

Modified: 2025-09-30T14:15:38.927

Link: CVE-2025-34225

cve-icon Redhat

No data.