Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code

Xerox FreeFlow Core Vulnerability Let Remote Attackers Execute Malicious Code

Posted on August 14, 2025August 14, 2025 By CWS

Crucial vulnerabilities in Xerox FreeFlow Core, a widely-used print orchestration platform, permit unauthenticated distant attackers to execute malicious code on susceptible methods. 

The failings, tracked as CVE-2025-8355 and CVE-2025-8356, have an effect on the JMF Shopper service and have been patched in FreeFlow Core model 8.0.5. 

Key Takeaways1. Two vital vulnerabilities in Xerox FreeFlow Core permit distant code execution assaults.2. Print outlets, universities, and authorities businesses utilizing FreeFlow Core are in danger.3. Improve instantly to patch vulnerabilities.

The vulnerabilities have been initially found throughout an investigation of what seemed to be a false constructive detection, finally revealing severe safety weaknesses that would compromise methods dealing with delicate pre-publication advertising supplies and industrial printing operations.

XXE Injection Vulnerability

Horizon3.ai experiences that the vulnerability, CVE-2025-8355, is an XML Exterior Entity (XXE) injection flaw affecting the JMF Shopper service listening on port 4004. 

This service processes Job Message Format (JMF) messages for managing print jobs and standing reporting. The vulnerability exists within the jmfclient.jar binary, which incorporates an XML parsing utility that fails to correctly sanitize or prohibit XML Exterior Entity utilization.

Attackers can exploit this weak point by submitting specifically crafted XML requests to carry out Server-Aspect Request Forgery (SSRF) assaults. 

The XML parser processes exterior entities with out validation, permitting malicious actors to learn native information, scan inside networks, or probably entry delicate data from backend methods. 

This vulnerability supplies an entry level for reconnaissance actions and could be chained with different assaults to escalate privileges throughout the goal atmosphere.

Path Traversal Vulnerability

The extra extreme vulnerability, CVE-2025-8356, is a path traversal flaw found within the file processing mechanism of JMF instructions. 

Safety researchers recognized that the processIncomingRQEMessage() operate fails to validate file paths throughout add operations correctly, enabling listing traversal assaults.

Attackers can craft malicious JMF command messages containing “../” sequences to flee the meant add listing and write information to arbitrary areas on the server filesystem. 

This functionality permits placement of webshells in publicly accessible directories, resulting in distant code execution. 

FreeFlow Core Vulnerability

Whereas the JMF Shopper service on port 4004 can’t immediately serve uploaded information, the first internet portals present the required performance to execute malicious payloads, making this vulnerability significantly harmful for organizations operating FreeFlow Core installations.

CVE IDTitleCVSS 3.1 ScoreSeverityCVE-2025-8355External XML Entity (XXE) Injection Vulnerability7.5HighCVE-2025-8356Path Traversal Vulnerability9.8Critical

Each vulnerabilities pose important dangers to organizations utilizing FreeFlow Core, significantly industrial print outlets, universities, authorities businesses, and advertising suppliers who deal with delicate pre-publication supplies. 

Xerox has addressed these points in FreeFlow Core model 8.0.5, and safety consultants strongly advocate instant upgrades to stop potential exploitation of those vital flaws.

Increase your SOC and assist your workforce shield what you are promoting with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Attackers, Code, Core, Execute, FreeFlow, Malicious, Remote, Vulnerability, Xerox

Post navigation

Previous Post: ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks
Next Post: Have You Turned Off Your Virtual Oven?

Related Posts

New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App New ZuRu Malware Variant Attacking macOS Users Via Weaponized Termius App Cyber Security News
ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access ASUS MyASUS Flaw Lets Hackers Escalate to SYSTEM-Level Access Cyber Security News
81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers Cyber Security News
Rising Cyber Threats Challenge Defense Sector Security Rising Cyber Threats Challenge Defense Sector Security Cyber Security News
Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Detego Global Launches Case Management Platform for Digital Forensics and Incident Response Teams Cyber Security News
Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Hackers Allegedly Claim Breach of Mercedes-Benz USA Legal and Customer Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News