Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-31629 | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a server-side request forgery (SSRF) vulnerability. The `/var/www/app/console_release/lexmark/update.php` script is reachable from the internet without any authentication. The PHP script builds URLs from user‑controlled values and then invokes either 'curl_exec()` or `file_get_contents()` without proper validation. Because the endpoint is unauthenticated, any remote attacker can supply a hostname and cause the server to issue requests to internal resources. This enables internal network reconnaissance, potential pivoting, or data exfiltration. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:*  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Wed, 01 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Tue, 30 Sep 2025 09:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Vasion
         Vasion virtual Appliance Application Vasion virtual Appliance Host  | 
|
| Vendors & Products | 
        
        Vasion
         Vasion virtual Appliance Application Vasion virtual Appliance Host  | 
Mon, 29 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a server-side request forgery (SSRF) vulnerability. The `/var/www/app/console_release/lexmark/update.php` script is reachable from the internet without any authentication. The PHP script builds URLs from user‑controlled values and then invokes either 'curl_exec()` or `file_get_contents()` without proper validation. Because the endpoint is unauthenticated, any remote attacker can supply a hostname and cause the server to issue requests to internal resources. This enables internal network reconnaissance, potential pivoting, or data exfiltration. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced. | |
| Title | Vasion Print (formerly PrinterLogic) SSRF via Lexmark update.php | |
| Weaknesses | CWE-306 CWE-918  | 
|
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-10-01T15:19:07.221Z
Reserved: 2025-04-15T19:15:22.574Z
Link: CVE-2025-34228
Updated: 2025-10-01T15:18:29.760Z
Status : Analyzed
Published: 2025-09-29T21:15:36.490
Modified: 2025-10-09T19:17:04.187
Link: CVE-2025-34228
No data.
                        OpenCVE Enrichment
                    Updated: 2025-09-30T08:47:47Z
 EUVD