Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind server-side request forgery (SSRF) vulnerability reachable via the /var/www/app/console_release/hp/log_off_single_sign_on.php script that can be exploited by an unauthenticated user. When a printer is registered, the software stores the printer’s host name in the variable $printer_vo->str_host_address. The code later builds a URL like 'http://<host‑address>:80/DevMgmt/DiscoveryTree.xml' and sends the request with curl. No validation, whitelist, or private‑network filtering is performed before the request is made. Because the request is blind, an attacker cannot see the data directly, but can still: probe internal services, trigger internal actions, or gather other intelligence. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
References
| Link | Resource |
|---|---|
| https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-ssrf-06 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/vasion-print-printerlogic-ssrf-via-hp-log-off-single-sign-on-php-script | Third Party Advisory |
| https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-ssrf-06 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Oct 2025, 16:13
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-ssrf-06 - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/vasion-print-printerlogic-ssrf-via-hp-log-off-single-sign-on-php-script - Third Party Advisory | |
| CPE | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* |
|
| First Time |
Vasion virtual Appliance Application
Vasion virtual Appliance Host Vasion |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.8 |
01 Oct 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-ssrf-06 - |
29 Sep 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-29 21:15
Updated : 2025-10-09 16:13
NVD link : CVE-2025-34230
Mitre link : CVE-2025-34230
CVE.ORG link : CVE-2025-34230
JSON object : View
Products Affected
vasion
- virtual_appliance_host
- virtual_appliance_application
