• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

Xerox FreeFlow Flaws Enable SSRF and Remote Code Execution

Jane Doe by Jane Doe
August 12, 2025
in Cyber
Share on FacebookShare on Twitter

Xerox has released an urgent security bulletin warning customers of two critical vulnerabilities in its FreeFlow Core software. These flaws, which could enable attackers to execute server-side request forgery (SSRF) and remote code execution (RCE) attacks, affect version 8.0.4 and have been classified as “IMPORTANT” severity. The company strongly urges all users to immediately update to the patched version, 8.0.5.

The first vulnerability, identified as CVE-2025-8355, is an XML External Entity (XXE) processing flaw that can lead to SSRF attacks. An attacker could craft malicious XML input to force the server to make unintended requests to internal or external resources. This could allow them to bypass firewalls and access internal systems that would otherwise be inaccessible, potentially exposing sensitive data or enabling network reconnaissance. For example, an attacker could trick the server into retrieving internal files or scanning for other vulnerable services on the network.

The second and more severe flaw, CVE-2025-8356, is a path traversal vulnerability that can lead to RCE. This type of attack allows a malicious actor to access files and directories outside of the intended scope by manipulating file path parameters. When successfully exploited, this can enable an attacker to upload and execute arbitrary code on the affected system, potentially leading to a complete system compromise. The combination of these two vulnerabilities is particularly dangerous, as an attacker could leverage the SSRF flaw to gain initial access and then use the path traversal to achieve full control.

Read

PAGERDUTY Confirms Data Breach After Salesforce Account Compromise

Thailand’s PDPA Crackdown 2025: Major Fines and Lessons from Latest Enforcement

Xerox’s security bulletin, XRX25-013, published on August 8, 2025, details these security risks. The vulnerabilities were discovered and responsibly disclosed by security researcher Jimi Sebree from Horizon3.ai, who worked with Xerox to develop and test the necessary mitigations.

The potential impact of these vulnerabilities on unpatched systems is significant, especially for enterprise environments that rely on FreeFlow Core for document and print management. A successful attack could result in unauthorized access to confidential documents, data exfiltration, and a complete system takeover. The company emphasizes that upgrading to FreeFlow Core version 8.0.5 is the only way to fully address both vulnerabilities.

Previous Post

SonicWall Pins Firewall Attack Spree on Year-Old Vulnerability

Next Post

MedusaLocker ransomware group is looking for pentesters

Jane Doe

Jane Doe

More Articles

UN Creates Two Mechanisms for Global Governance of AI
Cyber

French Retail Giant Auchan Discloses Cyberattack on Loyalty Accounts

French retail giant Auchan has confirmed that a cyberattack compromised the personal data of several hundred thousand customers, with the...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Hackers Breach Fintech Firm in Attempted $130M Bank Heist

A major Brazilian fintech company, Sinqia S.A., has revealed that it was the target of a sophisticated cyberattack on August...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

A Decade of Strengthening Singapore’s Cyber Defence Amid Escalating Threats

Over the last ten years, Singapore has systematically built a formidable cyber defence framework, positioning itself as a global leader...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Pentera Announces Automated Security Validation for Cl0p – Most Active Ransomware Group in 2025

Cybersecurity company Pentera has unveiled a new automated security validation module designed to test and fortify defenses against the Cl0p...

by Jane Doe
September 3, 2025
Next Post
Researchers Cracked the Encryption Used by DarkBit Ransomware

MedusaLocker ransomware group is looking for pentesters

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.