Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a protection mechanism failure vulnerability within the file_get_contents() function. When an administrator configures a printer’s hostname (or similar callback field), the value is passed unchecked to PHP’s file_get_contents()/cURL functions, which follow redirects and impose no allow‑list, scheme, or IP‑range restrictions. An admin‑level attacker can therefore point the hostname to a malicious web server that issues a 301 redirect to internal endpoints such as the AWS EC2 metadata service. The server follows the redirect, retrieves the metadata, and returns or stores the credentials, enabling the attacker to steal cloud IAM keys, enumerate internal services, and pivot further into the SaaS infrastructure. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.
References
| Link | Resource |
|---|---|
| https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-insecure-use-file_get_contents | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/vasion-print-printerlogic-insecure-use-of-file-get-contents-function | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Oct 2025, 17:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-insecure-use-file_get_contents - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/vasion-print-printerlogic-insecure-use-of-file-get-contents-function - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
| First Time |
Vasion virtual Appliance Application
Vasion virtual Appliance Host Vasion |
|
| CPE | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* |
29 Sep 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-29 21:15
Updated : 2025-10-09 17:50
NVD link : CVE-2025-34233
Mitre link : CVE-2025-34233
CVE.ORG link : CVE-2025-34233
JSON object : View
Products Affected
vasion
- virtual_appliance_host
- virtual_appliance_application
CWE
CWE-918
Server-Side Request Forgery (SSRF)
