Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (macOS/Linux client deployments) contain a vulnerability in the local logging mechanism. Authentication session tokens, including PHPSESSID, XSRF-TOKEN, and laravel_session, are stored in cleartext within world-readable log files. Any local user with access to the machine can extract these session tokens and use them to authenticate remotely to the SaaS environment, bypassing normal login credentials, potentially leading to unauthorized system access and exposure of sensitive information. This vulnerability has been identified by the vendor as: V-2022-008 — Secrets Leaked in Logs.
References
| Link | Resource |
|---|---|
| https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm | Vendor Advisory |
| https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#mac-leak-secrets | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/vasion-print-printerlogic-local-log-disclosure-of-cleartext-sessions | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
02 Oct 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Vasion Print (formerly PrinterLogic) Virtual Appliance Host versions prior to 1.0.735 and Application prior to 20.0.1330 (macOS/Linux client deployments) contain a vulnerability in the local logging mechanism. Authentication session tokens, including PHPSESSID, XSRF-TOKEN, and laravel_session, are stored in cleartext within world-readable log files. Any local user with access to the machine can extract these session tokens and use them to authenticate remotely to the SaaS environment, bypassing normal login credentials, potentially leading to unauthorized system access and exposure of sensitive information. This vulnerability has been identified by the vendor as: V-2022-008 — Secrets Leaked in Logs. |
24 Sep 2025, 19:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://help.printerlogic.com/saas/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://help.printerlogic.com/va/Print/Security/Security-Bulletins.htm - Vendor Advisory | |
| References | () https://pierrekim.github.io/blog/2025-04-08-vasion-printerlogic-83-vulnerabilities.html#mac-leak-secrets - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/vasion-print-printerlogic-local-log-disclosure-of-cleartext-sessions - Third Party Advisory | |
| CPE | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_host:*:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:vasion:virtual_appliance_application:*:*:*:*:*:*:*:* |
|
| First Time |
Linux linux Kernel
Vasion virtual Appliance Host Apple macos Apple Linux Vasion virtual Appliance Application Vasion |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
19 Sep 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-19 19:15
Updated : 2025-10-02 22:15
NVD link : CVE-2025-34188
Mitre link : CVE-2025-34188
CVE.ORG link : CVE-2025-34188
JSON object : View
Products Affected
linux
- linux_kernel
apple
- macos
vasion
- virtual_appliance_application
- virtual_appliance_host
CWE
CWE-532
Insertion of Sensitive Information into Log File
