Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise.
References
Link | Resource |
---|---|
https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm | Vendor Advisory |
https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-dead-code | Exploit Third Party Advisory |
https://www.vulncheck.com/advisories/vasion-print-printerlogic-dangerous-php-dead-code-enables-rce | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Sep 2025, 19:20
Type | Values Removed | Values Added |
---|---|---|
References | () https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
References | () https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-dead-code - Exploit, Third Party Advisory | |
References | () https://www.vulncheck.com/advisories/vasion-print-printerlogic-dangerous-php-dead-code-enables-rce - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Vasion virtual Appliance Host
Vasion virtual Appliance Application Vasion |
|
CPE | cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* |
19 Sep 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-19 19:15
Updated : 2025-09-24 19:20
NVD link : CVE-2025-34205
Mitre link : CVE-2025-34205
CVE.ORG link : CVE-2025-34205
JSON object : View
Products Affected
vasion
- virtual_appliance_application
- virtual_appliance_host
CWE
CWE-561
Dead Code