[CIVN-2025-0181] Multiple vulnerabilities in Xerox FreeFlow Core

By Published On: August 19, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple vulnerabilities in Xerox FreeFlow Core 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Xerox FreeFlow Core versions prior to 8.0.5
Overview
Multiple vulnerabilities have been reported in Xerox FreeFlow which could be exploited by an attacker to execute arbitrary commands or cause SSRF (Server-Side Request Forgery) on the targeted system.
Target Audience:
Organizations & individuals using affected Xerox FreeFlow Core.
Risk Assessment:
High risk of unauthorized access to sensitive information, remote code execution or service disruption.
Impact Assessment:
Potential for data theft, system instability or complete compromise of system.
Description
Xerox FreeFlow Core is an automation software that helps streamline print production workflows.
The reported vulnerabilities arise from improper handling of XML input and a path traversal issue.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary commands or cause SSRF (Server-Side Request Forgery) on the targeted system.
Solution
Apply appropriate updates as mentioned in the Xeroxs security bulletin:
https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf
https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf
Vendor Information
Xerox
https://www.support.xerox.com/
References
 
https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf
CVE Name
CVE-2025-8355
CVE-2025-8356
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=dpMO
—–END PGP SIGNATURE—–

Share this article