CVE-2025-27652
Published: 05 March 2025
Summary
CVE-2025-27652 is a critical-severity SSRF (CWE-918) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 31.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation through vendor-recommended upgrade to Virtual Appliance Host 22.0.862 Application 20.0.2014 directly eliminates the SSRF vulnerability.
Validating and sanitizing user-supplied URLs and request parameters prevents exploitation of the SSRF flaw by blocking forged server-side requests.
Boundary protection with firewalls or proxies restricts outbound connections to unauthorized internal resources even if SSRF is triggered.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The SSRF vulnerability in a publicly accessible application allows remote unauthenticated exploitation, directly mapping to T1190 for initial access.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: rfIDEAS V-2023-015.
Deeper analysisAI
CVE-2025-27652 is a Server-Side Request Forgery (SSRF) vulnerability, designated as rfIDEAS V-2023-015 and mapped to CWE-918, affecting Vasion Print (formerly PrinterLogic) in versions prior to Virtual Appliance Host 22.0.862 Application 20.0.2014. Published on 2025-03-05, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts across confidentiality, integrity, and availability.
Remote unauthenticated attackers can exploit this SSRF flaw over the network with minimal effort. Exploitation enables severe consequences, including high-level compromise of confidentiality through unauthorized data access, integrity violations via data manipulation, and availability disruptions, all without privileges or user involvement.
Vendor advisories recommend upgrading to Virtual Appliance Host 22.0.862 Application 20.0.2014 or later for mitigation. Further details appear in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, Pierre Kim's analysis of 83 related vulnerabilities at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html, and the Full Disclosure mailing list post at http://seclists.org/fulldisclosure/2025/Apr/18.
Details
- CWE(s)