Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

Posted on August 11, 2025August 11, 2025 By CWS

An pressing safety replace has been launched for Xerox FreeFlow Core software program, addressing two essential vulnerabilities that would enable attackers to execute distant code and carry out server-side request forgery assaults. 

The vulnerabilities, recognized as CVE-2025-8355 and CVE-2025-8356, have an effect on FreeFlow Core model 8.0.4 and require rapid patching to forestall potential exploitation. 

Safety researchers at Horizon3.ai found these flaws and labored collaboratively with Xerox to develop acceptable mitigations.

Key Takeaways1. Xerox FreeFlow Core v8.0.4 has XXE/SSRF and Path Traversal/RCE vulnerabilities.2. Attackers can bypass firewalls, entry delicate knowledge.3. Improve instantly to forestall exploitation.

SSRF and RCE Vulnerabilities 

The primary vulnerability, CVE-2025-8355, entails an XML Exterior Entity (XXE) processing flaw that results in Server-Facet Request Forgery (SSRF) assaults. 

One of these vulnerability happens when an utility processes XML enter with out correctly disabling exterior entity references, permitting attackers to govern the XML parser to make unauthorized requests to inside techniques. 

Via SSRF exploitation, malicious actors can doubtlessly entry delicate inside assets, bypass firewall restrictions, and collect intelligence concerning the goal community infrastructure.

The second and extra extreme vulnerability, CVE-2025-8356, represents a path traversal weak point that may escalate to Distant Code Execution (RCE). 

Path traversal vulnerabilities allow attackers to entry information and directories exterior the meant utility scope by manipulating file paths with particular characters like “../” sequences. 

When efficiently exploited, this vulnerability can enable attackers to add malicious information, execute arbitrary instructions on the server, and doubtlessly achieve full management over the affected system.

CVETitleSeverityCVE-2025-8355XML Exterior Entity (XXE) resulting in Server-Facet Request Forgery (SSRF)IMPORTANTCVE-2025-8356Path Traversal resulting in Distant Code Execution (RCE)IMPORTANT

Mitigations

Xerox issued a Safety Bulletin on August 8, 2025, emphasizing the essential nature of those vulnerabilities and urging rapid remediation. 

The corporate has rated each vulnerabilities at an “IMPORTANT” severity degree, indicating vital potential affect on affected techniques. 

Organizations operating FreeFlow Core of their print infrastructure face substantial threat if these vulnerabilities stay unpatched, as profitable exploitation might compromise total community segments.

Jimi Sebree from Horizon3.ai collaborated with Xerox’s safety crew by way of accountable disclosure practices, guaranteeing that correct fixes have been developed earlier than public announcement. 

Xerox has launched FreeFlow Core model 8.0.5 because the definitive answer, which incorporates complete patches for each CVE-2025-8355 and CVE-2025-8356. 

Organizations ought to prioritize rapid deployment of this replace by way of official Xerox distribution channels to forestall potential assaults focusing on these newly disclosed vulnerabilities.

Equip your SOC with full entry to the most recent risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacks, FreeFlow, Leads, RCE, SSRF, Vulnerabilities, Xerox

Post navigation

Previous Post: INE Named to Training Industry’s 2025 Top 20 Online Learning Library List
Next Post: APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials

Related Posts

Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code Apache Syncope Groovy RCE Vulnerability Let Attackers Inject Malicious Code Cyber Security News
Jenkins Security Flaws Pose Major XSS Threats Jenkins Security Flaws Pose Major XSS Threats Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack Cyber Security News
New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information Workday Confirms Data Breach – Hackers Accessed Customers Data and Case Information Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark