CVE-2025-27668
Published: 05 March 2025
Summary
CVE-2025-27668 is a critical-severity Inclusion of Functionality from Untrusted Control Sphere (CWE-829) vulnerability in Printerlogic Vasion Print. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-27668 by requiring timely patching of the vulnerable Virtual Appliance Host and Application versions as specified in the vendor security bulletin.
Validates information inputs to block injection of arbitrary iframe sources from untrusted control spheres, addressing CWE-829 exploitation.
Filters information outputs to prevent rendering of malicious iframes that could lead to unauthorized data access, modification, or disruption.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote unauthenticated vulnerability in a public-facing web application (Vasion Print Virtual Appliance) allowing arbitrary iframe/content inclusion from untrusted sources, directly enabling exploitation of public-facing applications.
NVD Description
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012.
Deeper analysisAI
CVE-2025-27668 is a high-severity vulnerability in Vasion Print, formerly known as PrinterLogic, specifically affecting versions of the Virtual Appliance Host before 22.0.843 with Application before 20.0.1923. The issue enables arbitrary content inclusion via iframe, tracked as OVE-20230524-0012 and mapped to CWE-829 (Inclusion of Functionality from Untrusted Control Sphere). It carries a CVSS v3.1 base score of 9.8, reflecting critical risk due to its network accessibility, low attack complexity, and lack of prerequisites.
Unauthenticated attackers can exploit this vulnerability remotely over the network without user interaction or privileges, achieving high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope. By injecting arbitrary iframes, attackers could include malicious external content, potentially leading to unauthorized data access, modification, or disruption of the print management appliance's functionality.
Mitigation details are outlined in the vendor's security bulletin at https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm, which practitioners should consult for patching instructions and workarounds applicable to affected Virtual Appliance Host and Application versions.
Details
- CWE(s)