CVE-2025-34210
MEDIUMVasion Print Virtual Appliance Host & Application - Info Disclosure
Title source: llmDescription
Vasion Print (formerly PrinterLogic) Virtual Appliance Host and Application (VA/SaaS deployments) store a large number of sensitive credentials (database passwords, MySQL root password, SaaS keys, Portainer admin password, etc.) in cleartext files that are world-readable. Any local user - or any process that can read the host filesystem - can retrieve all of these secrets in plain text, leading to credential theft and full compromise of the appliance. The vendor does not consider this to be a security vulnerability as this product "follows a shared responsibility model, where administrators are expected to configure persistent storage encryption."
References (4)
Scores
CVSS v3
5.5
EPSS
0.0001
EPSS Percentile
1.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Classification
CWE
CWE-256
Status
published
Affected Products (2)
vasion/virtual_appliance_application
vasion/virtual_appliance_host
Timeline
Published
Oct 02, 2025
Tracked Since
Feb 18, 2026