CVE-2025-27655
Published: 05 March 2025
Summary
CVE-2025-27655 is a critical-severity SSRF (CWE-918) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 32.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation by upgrading to Virtual Appliance Host 22.0.862 Application 20.0.2014 directly eliminates the SSRF vulnerability.
Validating and sanitizing user-supplied inputs for URLs, hosts, and protocols prevents attackers from forging server-side requests to unauthorized destinations.
Boundary protection at network interfaces blocks SSRF-exploited requests from reaching internal services or scanning the network.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF in public-facing web app directly enables T1190 for initial exploitation; description explicitly notes internal network scanning enabling T1046 Network Service Discovery.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.862 Application 20.0.2014 allows Server-Side Request Forgery: CPA v1 V-2023-009.
Deeper analysisAI
CVE-2025-27655 is a Server-Side Request Forgery (SSRF) vulnerability, mapped to CWE-918, affecting Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.862 when running Application versions prior to 20.0.2014. Designated as CPA v1 V-2023-009, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Remote attackers require no authentication or privileges and can exploit the flaw over the network with low complexity and no user interaction. Successful exploitation enables high-impact compromise of confidentiality, integrity, and availability, allowing attackers to manipulate server-side requests for unauthorized actions such as internal network scanning or service abuse.
Mitigation details are outlined in PrinterLogic's security bulletins at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, with comprehensive analysis of this flaw alongside 82 other vulnerabilities in Pierre Kim's advisory at https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html. A related full disclosure appears on Seclists at http://seclists.org/fulldisclosure/2025/Apr/18. Upgrading to Virtual Appliance Host 22.0.862 Application 20.0.2014 or later addresses the issue.
Details
- CWE(s)