CVE-2025-27640
Published: 05 March 2025
Summary
CVE-2025-27640 is a critical-severity SQL Injection (CWE-89) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates this SQL injection vulnerability by requiring timely installation of the vendor-recommended upgrade to Virtual Appliance Host 22.0.1002 Application 20.0.2614.
Prevents SQL injection exploitation by implementing input validation mechanisms to reject or sanitize malicious SQL queries at application entry points.
Detects the SQL injection vulnerability through vulnerability scanning, enabling prioritization and remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible application directly enables T1190 (Exploit Public-Facing Application) for unauthenticated remote exploitation; arbitrary SQL queries also facilitate T1213.006 (Data from Information Repositories: Databases) for reading/modifying DB contents.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.1002 Application 20.0.2614 allows SQL Injection V-2024-012.
Deeper analysisAI
CVE-2025-27640 is a SQL injection vulnerability (CWE-89) in Vasion Print, formerly known as PrinterLogic, affecting Virtual Appliance Host versions before 22.0.1002 and Application versions before 20.0.2614. Published on 2025-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
An unauthenticated attacker with network access can exploit this vulnerability through low-complexity attacks requiring no user interaction. Exploitation enables high-impact consequences across confidentiality, integrity, and availability, such as executing arbitrary SQL queries to read sensitive data, modify database contents, or disrupt services.
The vendor's security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm provides details on mitigation, with upgrading to Virtual Appliance Host 22.0.1002 Application 20.0.2614 or later resolving the SQL injection issue designated as V-2024-012.
Details
- CWE(s)