Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Posted on August 14, 2025August 14, 2025 By CWS

Two severe vulnerabilities had been patched lately by Xerox in its FreeFlow Core print orchestration platform. 

In accordance with pentesting firm Horizon3, whose researchers found the issues, FreeFlow Core is affected by an XXE injection flaw (CVE-2025-8355) and a path traversal subject (CVE-2025-8356).

The researchers found that the vulnerabilities might enable an unauthenticated, distant attacker to execute arbitrary code on affected FreeFlow Core cases.

The potential affect has been demonstrated with an exploit that positioned a webshell on the focused system.

FreeFlow Core is designed for prepress automation workflows and it’s sometimes utilized by organizations with large-scale printing operations, together with universities, packaging and advertising and marketing corporations, and even authorities companies, in response to Horizon3. 

“Given the character of the product, FreeFlow Core installations have quite a lot of shifting elements and require comparatively open entry and availability, which mixed with the truth that print jobs of this type usually comprise pre-public info round advertising and marketing campaigns makes this a super goal for attackers,” the safety agency warned.

The vulnerabilities had been reported to Xerox in June they usually had been patched on August 8, when the seller revealed an advisory to tell prospects concerning the availability of patches. Fixes are included in FreeFlow Core model 8.0.5.

Earlier this yr, researchers disclosed vulnerabilities in Xerox VersaLink multifunction printers that might enable attackers to retrieve authentication credentials, which might then be used for lateral motion.Commercial. Scroll to proceed studying.

Associated: New Vulnerabilities Expose Tens of millions of Brother Printers to Hacking

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated: Important Vulnerability Present in Canon Printer Drivers

Associated: Fortinet, Ivanti Launch August 2025 Safety Patches

Security Week News Tags:Code, Execution, Orchestration, Print, Product, Remote, Vulnerabilities, Xerox

Post navigation

Previous Post: Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
Next Post: Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability

Related Posts

Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Watch Now: CodeSecCon – Where Software Security’s Next Chapter Unfolds (Virtual Event) Security Week News
Backdoored Open Source Malware Repositories Target Novice Cybercriminals Backdoored Open Source Malware Repositories Target Novice Cybercriminals Security Week News
Fraud Prevention Firm Resistant AI Raises  Million Fraud Prevention Firm Resistant AI Raises $25 Million Security Week News
US Seizes .8 Million From Zeppelin Ransomware Operator US Seizes $2.8 Million From Zeppelin Ransomware Operator Security Week News
Dataminr to Acquire ThreatConnect for 0 Million Dataminr to Acquire ThreatConnect for $290 Million Security Week News
Google Warns of Rising Malicious AI Prompt Injection Attacks Google Warns of Rising Malicious AI Prompt Injection Attacks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark