Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

Posted on August 11, 2025August 11, 2025 By CWS

An pressing safety replace has been launched for Xerox FreeFlow Core software program, addressing two essential vulnerabilities that would enable attackers to execute distant code and carry out server-side request forgery assaults. 

The vulnerabilities, recognized as CVE-2025-8355 and CVE-2025-8356, have an effect on FreeFlow Core model 8.0.4 and require rapid patching to forestall potential exploitation. 

Safety researchers at Horizon3.ai found these flaws and labored collaboratively with Xerox to develop acceptable mitigations.

Key Takeaways1. Xerox FreeFlow Core v8.0.4 has XXE/SSRF and Path Traversal/RCE vulnerabilities.2. Attackers can bypass firewalls, entry delicate knowledge.3. Improve instantly to forestall exploitation.

SSRF and RCE Vulnerabilities 

The primary vulnerability, CVE-2025-8355, entails an XML Exterior Entity (XXE) processing flaw that results in Server-Facet Request Forgery (SSRF) assaults. 

One of these vulnerability happens when an utility processes XML enter with out correctly disabling exterior entity references, permitting attackers to govern the XML parser to make unauthorized requests to inside techniques. 

Via SSRF exploitation, malicious actors can doubtlessly entry delicate inside assets, bypass firewall restrictions, and collect intelligence concerning the goal community infrastructure.

The second and extra extreme vulnerability, CVE-2025-8356, represents a path traversal weak point that may escalate to Distant Code Execution (RCE). 

Path traversal vulnerabilities allow attackers to entry information and directories exterior the meant utility scope by manipulating file paths with particular characters like “../” sequences. 

When efficiently exploited, this vulnerability can enable attackers to add malicious information, execute arbitrary instructions on the server, and doubtlessly achieve full management over the affected system.

CVETitleSeverityCVE-2025-8355XML Exterior Entity (XXE) resulting in Server-Facet Request Forgery (SSRF)IMPORTANTCVE-2025-8356Path Traversal resulting in Distant Code Execution (RCE)IMPORTANT

Mitigations

Xerox issued a Safety Bulletin on August 8, 2025, emphasizing the essential nature of those vulnerabilities and urging rapid remediation. 

The corporate has rated each vulnerabilities at an “IMPORTANT” severity degree, indicating vital potential affect on affected techniques. 

Organizations operating FreeFlow Core of their print infrastructure face substantial threat if these vulnerabilities stay unpatched, as profitable exploitation might compromise total community segments.

Jimi Sebree from Horizon3.ai collaborated with Xerox’s safety crew by way of accountable disclosure practices, guaranteeing that correct fixes have been developed earlier than public announcement. 

Xerox has launched FreeFlow Core model 8.0.5 because the definitive answer, which incorporates complete patches for each CVE-2025-8355 and CVE-2025-8356. 

Organizations ought to prioritize rapid deployment of this replace by way of official Xerox distribution channels to forestall potential assaults focusing on these newly disclosed vulnerabilities.

Equip your SOC with full entry to the most recent risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacks, FreeFlow, Leads, RCE, SSRF, Vulnerabilities, Xerox

Post navigation

Previous Post: INE Named to Training Industry’s 2025 Top 20 Online Learning Library List
Next Post: APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials

Related Posts

15 Best Identity & Access Management Solutions (IAM) in 2025 Cyber Security News
Wing FTP Server Vulnerability Actively Exploited Cyber Security News
CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack Cyber Security News
Hackers Weaponized Linux Webcams as Attack Tools to Inject Keystrokes and Launch Attacks Cyber Security News
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Cyber Security News
BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News