🔐 CVE Alert

CVE-2025-34205

UNKNOWN 0.0

Vasion Print (formerly PrinterLogic) Dangerous PHP Dead Code Enables RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 22.0.843 and Application prior to 20.0.1923 (VA and SaaS deployments) contains dangerous PHP dead code present in multiple Docker-hosted PHP instances. A script named /var/www/app/resetroot.php (found in several containers) lacks authentication checks and, when executed, performs a SQL update that sets the database administrator username to 'root' and its password hash to the SHA-512 hash of the string 'password'. Separately, commented-out code in /var/www/app/lib/common/oses.php would unserialize session data (unserialize($_SESSION['osdata']))—a pattern that can enable remote code execution if re-enabled or reached with attacker-controlled serialized data. An attacker able to reach the resetroot.php endpoint can trivially reset the MySQL root password and obtain full database control; combined with deserialization issues this can lead to full remote code execution and system compromise. This vulnerability has been identified by the vendor as: V-2023-003 — Dead / Insecure PHP Code.

CWE CWE-561
Vendor vasion
Product print virtual appliance host
Published Sep 19, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for vasion print virtual appliance host

Be the first to know when new unknown vulnerabilities affecting vasion print virtual appliance host are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Vasion / Print Virtual Appliance Host
* < 22.0.843
Vasion / Print Application
* < 20.0.1923

References

NVD ↗ CVE.org ↗ EPSS Data ↗
pierrekim.github.io: https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#va-dead-code help.printerlogic.com: https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm help.printerlogic.com: https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm vulncheck.com: https://www.vulncheck.com/advisories/vasion-print-printerlogic-dangerous-php-dead-code-enables-rce

Credits

Pierre Barre