Ethical Hacking News
Xerox has addressed two serious vulnerabilities in its FreeFlow Core platform, CVE-2025-8355 (XXE injection) and CVE-2025-8356 (path traversal), which allowed unauthenticated remote code execution. Organizations relying on the platform are urged to upgrade to version 8.0.5 as soon as possible.
Xerox has addressed two serious vulnerabilities in their FreeFlow Core platform with patches released in version 8.0.5.The vulnerabilities, CVE-2025-8355 and CVE-2025-8356, are easily exploitable, allowing attackers to execute malicious payloads through JMF commands and leverage web portals for delivery.One vulnerability (CVE-2025-8355) enables XXE injection attacks that can lead to SSRF (Server-Side Request Forgery) attacks without authentication.Another vulnerability (CVE-2025-8356) allows path traversal, potentially leading to webshell placement and sensitive data exploitation.Organizations using FreeFlow Core must prioritize upgrading to version 8.0.5 to mitigate these risks due to the presence of sensitive information in print jobs.
Xerox, a leading provider of print management solutions, has addressed two serious vulnerabilities in their FreeFlow Core platform. The patches, released in version 8.0.5, aim to prevent unauthenticated remote code execution (RCE) through path traversal and XML External Entity (XXE) injection attacks. While the news may seem like a routine update for IT professionals, it serves as a stark reminder of the importance of maintaining the security posture of print automation platforms.
The vulnerabilities in question, CVE-2025-8355 and CVE-2025-8356, were identified by Horizon3, a cybersecurity firm that specializes in discovering and analyzing vulnerabilities. The research revealed that both issues are easily exploitable, allowing an attacker to execute malicious payloads through JMF commands and leverage web portals for delivery.
In the case of CVE-2025-8355, the XXE injection vulnerability is triggered by improperly sanitized XML in the JMF Client service. This allows an attacker to inject external entities, potentially leading to SSRF (Server-Side Request Forgery) attacks. The severity of this issue lies in its ability to enable RCE without requiring authentication.
On the other hand, CVE-2025-8356 is a path traversal vulnerability that affects file-handling routines within FreeFlow Core. This allows an attacker to place a webshell in a publicly accessible location, effectively granting access to sensitive data and potentially leading to further exploitation.
The researchers at Horizon3 emphasize that these vulnerabilities are particularly concerning due to the nature of print automation platforms like FreeFlow Core. The fact that these installations often have open access and availability makes them prime targets for attackers seeking to exploit weaknesses in the system.
Furthermore, the report highlights that print jobs typically contain sensitive information regarding marketing campaigns, making it an attractive target for attackers. As such, organizations relying on FreeFlow Core for their print automation needs must prioritize upgrading to the latest version (8.0.5) as soon as possible to mitigate these risks.
Xerox's prompt response to address these vulnerabilities is a testament to their commitment to maintaining the security and integrity of their products. The patches released in version 8.0.5 should provide adequate protection against these specific attacks, but it underscores the importance of ongoing vigilance when it comes to ensuring the security of critical infrastructure like print automation platforms.
In conclusion, while the news may seem straightforward at first glance, it serves as a poignant reminder of the ever-evolving threat landscape and the need for organizations to remain vigilant in their pursuit of cybersecurity excellence. As the boundaries between physical and digital worlds continue to blur, it is crucial that we prioritize the security of critical infrastructure like FreeFlow Core.
Related Information:
https://www.ethicalhackingnews.com/articles/Xerox-Fixes-Critical-FreeFlow-Core-Vulnerabilities-A-Cautionary-Tale-for-Print-Automation-Platforms-ehn.shtml
Published: Mon Aug 18 04:11:45 2025 by llama3.2 3B Q4_K_M