Cyber Posture

CVE-2025-34231

HighPublic PoC

Published: 29 September 2025

Published
29 September 2025
Modified
09 October 2025
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0024 46.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-34231 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Vasion Virtual Appliance Application. Its CVSS base score is 8.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 46.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-4 (Information Flow Enforcement) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 3 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring validation of user-controlled parameters used to build URLs before invoking processCurl() or file_get_contents(), preventing SSRF exploitation.

prevent

Enforces information flow control policies to block unauthorized outbound requests from the vulnerable script to internal resources, mitigating reconnaissance, leakage, pivoting, and exfiltration.

prevent

Monitors and controls communications at external and internal boundaries, preventing SSRF-induced requests from reaching or scanning internal networks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1090.001 Internal Proxy Command And Control
Adversaries may use an internal proxy to direct command and control traffic between two or more systems in a compromised environment.
T1041 Exfiltration Over C2 Channel Exfiltration
Adversaries may steal data by exfiltrating it over an existing command and control channel.
Why these techniques?

Unauthenticated SSRF in public-facing endpoint (T1190) enables internal network service discovery (T1046), use of the server as an internal proxy for pivoting (T1090.001), and exfiltration of internal data via SSRF responses (T1041), facilitating reconnaissance, credential leakage, pivoting, and data exfiltration.

NVD Description

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 25.1.102 and Application prior to version 25.1.1413 (VA/SaaS deployments) contain a blind and non-blind server-side request forgery (SSRF) vulnerability. The '/var/www/app/console_release/hp/badgeSetup.php' script is reachable from the Internet without any authentication…

more

and builds URLs from user‑controlled parameters before invoking either the custom processCurl() function or PHP’s file_get_contents(); in both cases the hostname/URL is taken directly from the request with no whitelist, scheme restriction, IP‑range validation, or outbound‑network filtering. Consequently, any unauthenticated attacker can force the server to issue arbitrary HTTP requests to internal resources. This enables internal network reconnaissance, credential leakage, pivoting, and data exfiltration. This vulnerability has been confirmed to be remediated, but it is unclear as to when the patch was introduced.

Deeper analysisAI

CVE-2025-34231 is a blind and non-blind server-side request forgery (SSRF) vulnerability in Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 25.1.102 and Application versions prior to 25.1.1413, affecting both VA and SaaS deployments. The issue resides in the '/var/www/app/console_release/hp/badgeSetup.php' script, which is exposed to the internet without authentication. This script builds URLs directly from user-controlled parameters and invokes either the custom processCurl() function or PHP's file_get_contents() without whitelisting hostnames, scheme restrictions, IP-range validation, or outbound network filtering.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no user interaction, achieving high-impact confidentiality breaches in a scoped context, as reflected in its CVSS v3.1 score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). Exploitation forces the server to issue arbitrary HTTP requests to internal resources, enabling internal network reconnaissance, credential leakage, pivoting, and data exfiltration.

PrinterLogic security bulletins for SaaS and VA deployments, along with advisories from VulnCheck and researcher Pierre Kim, confirm the vulnerability has been remediated, though the specific version introducing the patch remains unclear. Security practitioners should upgrade to Virtual Appliance Host version 25.1.102 or later and Application version 25.1.1413 or later, and consult the referenced advisories for full details on mitigation.

This SSRF vulnerability is documented as part of 83 vulnerabilities identified by Pierre Kim in Vasion/PrinterLogic products.

Details

CWE(s)

Affected Products

vasion
virtual appliance application
≤ 25.1.1413
vasion
virtual appliance host
≤ 25.1.102

CVEs Like This One

CVE-2025-34228Same product: Vasion Virtual Appliance Application
CVE-2025-34225Same product: Vasion Virtual Appliance Application
CVE-2025-34224Same product: Vasion Virtual Appliance Application
CVE-2025-34218Same product: Vasion Virtual Appliance Application
CVE-2025-34221Same product: Vasion Virtual Appliance Application
CVE-2025-34215Same product: Vasion Virtual Appliance Application
CVE-2025-34216Same product: Vasion Virtual Appliance Application
CVE-2025-34223Same product: Vasion Virtual Appliance Application
CVE-2025-34222Same product: Vasion Virtual Appliance Application
CVE-2025-34207Same product: Vasion Virtual Appliance Application

References