Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

Posted on August 11, 2025August 11, 2025 By CWS

An pressing safety replace has been launched for Xerox FreeFlow Core software program, addressing two essential vulnerabilities that would enable attackers to execute distant code and carry out server-side request forgery assaults. 

The vulnerabilities, recognized as CVE-2025-8355 and CVE-2025-8356, have an effect on FreeFlow Core model 8.0.4 and require rapid patching to forestall potential exploitation. 

Safety researchers at Horizon3.ai found these flaws and labored collaboratively with Xerox to develop acceptable mitigations.

Key Takeaways1. Xerox FreeFlow Core v8.0.4 has XXE/SSRF and Path Traversal/RCE vulnerabilities.2. Attackers can bypass firewalls, entry delicate knowledge.3. Improve instantly to forestall exploitation.

SSRF and RCE Vulnerabilities 

The primary vulnerability, CVE-2025-8355, entails an XML Exterior Entity (XXE) processing flaw that results in Server-Facet Request Forgery (SSRF) assaults. 

One of these vulnerability happens when an utility processes XML enter with out correctly disabling exterior entity references, permitting attackers to govern the XML parser to make unauthorized requests to inside techniques. 

Via SSRF exploitation, malicious actors can doubtlessly entry delicate inside assets, bypass firewall restrictions, and collect intelligence concerning the goal community infrastructure.

The second and extra extreme vulnerability, CVE-2025-8356, represents a path traversal weak point that may escalate to Distant Code Execution (RCE). 

Path traversal vulnerabilities allow attackers to entry information and directories exterior the meant utility scope by manipulating file paths with particular characters like “../” sequences. 

When efficiently exploited, this vulnerability can enable attackers to add malicious information, execute arbitrary instructions on the server, and doubtlessly achieve full management over the affected system.

CVETitleSeverityCVE-2025-8355XML Exterior Entity (XXE) resulting in Server-Facet Request Forgery (SSRF)IMPORTANTCVE-2025-8356Path Traversal resulting in Distant Code Execution (RCE)IMPORTANT

Mitigations

Xerox issued a Safety Bulletin on August 8, 2025, emphasizing the essential nature of those vulnerabilities and urging rapid remediation. 

The corporate has rated each vulnerabilities at an “IMPORTANT” severity degree, indicating vital potential affect on affected techniques. 

Organizations operating FreeFlow Core of their print infrastructure face substantial threat if these vulnerabilities stay unpatched, as profitable exploitation might compromise total community segments.

Jimi Sebree from Horizon3.ai collaborated with Xerox’s safety crew by way of accountable disclosure practices, guaranteeing that correct fixes have been developed earlier than public announcement. 

Xerox has launched FreeFlow Core model 8.0.5 because the definitive answer, which incorporates complete patches for each CVE-2025-8355 and CVE-2025-8356. 

Organizations ought to prioritize rapid deployment of this replace by way of official Xerox distribution channels to forestall potential assaults focusing on these newly disclosed vulnerabilities.

Equip your SOC with full entry to the most recent risk knowledge from ANY.RUN TI Lookup that may Enhance incident response -> Get 14-day Free Trial

Cyber Security News Tags:Attacks, FreeFlow, Leads, RCE, SSRF, Vulnerabilities, Xerox

Post navigation

Previous Post: INE Named to Training Industry’s 2025 Top 20 Online Learning Library List
Next Post: APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials

Related Posts

Interlock Ransomware With Double Extortion Tactics Attacking Windows and Linux Systems Cyber Security News
Armenian Hacker Extradited to U.S. After Ransomware Attacks on Tech Firms Cyber Security News
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results Cyber Security News
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Cyber Security News
20 Best Inventory Management Tools in 2025 Cyber Security News
Hackers Attacking Apache Tomcat Manager From 400 Unique IPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Adobe Patches Over 60 Vulnerabilities Across 13 Products
  • Microsoft Patches Over 100 Vulnerabilities
  • How to Secure Your Gaming Accounts
  • BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes
  • Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Adobe Patches Over 60 Vulnerabilities Across 13 Products
  • Microsoft Patches Over 100 Vulnerabilities
  • How to Secure Your Gaming Accounts
  • BlackSuit Ransomware Servers Attacking U.S. Critical Infrastructure Seized by Law Enforcement Seizes
  • Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News