Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Posted on August 14, 2025August 14, 2025 By CWS

Two severe vulnerabilities had been patched lately by Xerox in its FreeFlow Core print orchestration platform. 

In accordance with pentesting firm Horizon3, whose researchers found the issues, FreeFlow Core is affected by an XXE injection flaw (CVE-2025-8355) and a path traversal subject (CVE-2025-8356).

The researchers found that the vulnerabilities might enable an unauthenticated, distant attacker to execute arbitrary code on affected FreeFlow Core cases.

The potential affect has been demonstrated with an exploit that positioned a webshell on the focused system.

FreeFlow Core is designed for prepress automation workflows and it’s sometimes utilized by organizations with large-scale printing operations, together with universities, packaging and advertising and marketing corporations, and even authorities companies, in response to Horizon3. 

“Given the character of the product, FreeFlow Core installations have quite a lot of shifting elements and require comparatively open entry and availability, which mixed with the truth that print jobs of this type usually comprise pre-public info round advertising and marketing campaigns makes this a super goal for attackers,” the safety agency warned.

The vulnerabilities had been reported to Xerox in June they usually had been patched on August 8, when the seller revealed an advisory to tell prospects concerning the availability of patches. Fixes are included in FreeFlow Core model 8.0.5.

Earlier this yr, researchers disclosed vulnerabilities in Xerox VersaLink multifunction printers that might enable attackers to retrieve authentication credentials, which might then be used for lateral motion.Commercial. Scroll to proceed studying.

Associated: New Vulnerabilities Expose Tens of millions of Brother Printers to Hacking

Associated: Printer Firm Procolored Served Contaminated Software program for Months

Associated: Important Vulnerability Present in Canon Printer Drivers

Associated: Fortinet, Ivanti Launch August 2025 Safety Patches

Security Week News Tags:Code, Execution, Orchestration, Print, Product, Remote, Vulnerabilities, Xerox

Post navigation

Previous Post: Apache Tomcat Vulnerabilities Let Attackers Trigger Dos Attack
Next Post: Canada’s House of Commons Hit by Cyberattack Exploiting Recent Microsoft vulnerability

Related Posts

eSIM Hack Allows for Cloning, Spying  Security Week News
Data Breach at Doctors Imaging Group Impacts 171,000 People Security Week News
Chinese Hackers Hit Drone Sector in Supply Chain Attacks Security Week News
Cloudflare Tunnels Abused in New Malware Campaign Security Week News
Suspected DoppelPaymer Ransomware Group Member Arrested Security Week News
Vulnerabilities Expose Helmholz Industrial Routers to Hacking Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News