Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Coded Smorgasbord: High Strung

      September 26, 2025

      Chainguard launches trusted collection of verified JavaScript libraries

      September 26, 2025

      CData launches Connect AI to provide agents access to enterprise data sources

      September 26, 2025

      PostgreSQL 18 adds asynchronous I/O to improve performance

      September 26, 2025

      Distribution Release: Neptune 9.0

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025

      Distribution Release: SysLinuxOS 13

      September 23, 2025

      Development Release: MX Linux 25 Beta 1

      September 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      PHP 8.5.0 RC 1 available for testing

      September 26, 2025
      Recent

      PHP 8.5.0 RC 1 available for testing

      September 26, 2025

      Terraform Code Generator Using Ollama and CodeGemma

      September 26, 2025

      Beyond Denial: How AI Concierge Services Can Transform Healthcare from Reactive to Proactive

      September 25, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Distribution Release: Neptune 9.0

      September 25, 2025
      Recent

      Distribution Release: Neptune 9.0

      September 25, 2025

      FOSS Weekly #25.39: Kill Switch Phones, LMDE 7, Zorin OS 18 Beta, Polybar, Apt History and More Linux Stuff

      September 25, 2025

      Distribution Release: Kali Linux 2025.3

      September 23, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»CVE-2025-8355 & CVE-2025-8356: Xerox Issues Urgent Fixes for SSRF and RCE Bugs

    CVE-2025-8355 & CVE-2025-8356: Xerox Issues Urgent Fixes for SSRF and RCE Bugs

    August 11, 2025

    CVE-2025-8355

    Xerox Corporation has issued urgent security updates addressing two high-impact vulnerabilities in its FreeFlow Core software. The flaws, now tracked as CVE-2025-8355 and CVE-2025-8356, have the potential to expose enterprise environments to server-side request forgery (SSRF) and remote code execution (RCE) attacks if left unpatched. 

    Disclosed in Security Bulletin XRX25-013, published on August 8, 2025, the vulnerabilities specifically impact FreeFlow Core version 8.0.4. Xerox has categorized both vulnerabilities as “IMPORTANT” in severity and urges users to upgrade to version 8.0.5, which contains the necessary security fixes. 

    Details of the Xerox Vulnerabilities: CVE-2025-8355 and CVE-2025-8356 

    The first issue, CVE-2025-8355, arises from an XML External Entity (XXE) processing flaw. In affected systems, improperly sanitized XML input can allow attackers to manipulate entity declarations, enabling SSRF attacks. This allows an adversary to craft XML payloads that force the server to initiate unintended requests to internal services or external targets. Such requests can be used to probe internal infrastructure, exfiltrate data, or bypass access controls. 

    The second vulnerability, CVE-2025-8356, is a path traversal flaw that may lead to remote code execution. By exploiting poorly validated file path inputs, an attacker could access directories outside the intended scope of the application. If leveraged correctly, this vulnerability could allow malicious actors to execute arbitrary code on the host system, resulting in a complete system compromise. 

    Both flaws are rated under the Common Vulnerability Scoring System (CVSS) 3.1 with a base score of 7.5, classified as “HIGH” by Xerox. The associated vector string is:
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N.

    However, it’s worth noting that the National Vulnerability Database (NVD) has not yet published its own CVSS assessment at the time of the bulletin’s release.

    Discovery and Responsible Disclosure 

    These vulnerabilities in Xerox systems were discovered by Jimi Sebree, a security researcher with Horizon3.ai. Sebree collaborated directly with Xerox’s internal security team to ensure a coordinated disclosure and timely patch release. 

    Xerox acknowledged the researcher’s role in the bulletin, stating: 

    “Thank you to Jimi Sebree with Horizon3.ai for working with the Xerox Team to identify and mitigate these vulnerabilities.” 

    This responsible disclosure process enabled Xerox to develop and test patches before the flaws became widely known, reducing the potential for exploitation in the wild. 

    Risks to Organizations 

    The presence of both CVE-2025-8355 and CVE-2025-8356 in FreeFlow Core 8.0.4 elevates the cyber threats for organizations relying on the platform for document workflow automation. Exploiting these vulnerabilities could lead to: 

    • Unauthorized access to internal services via SSRF 
    • Exposure or theft of sensitive information 
    • Execution of malicious code on Xerox servers 
    • Full system compromise 
    • Broader network reconnaissance and lateral movement 

    Given the critical role that FreeFlow Core plays in document processing infrastructures, these issues could severely disrupt business operations and compromise sensitive data if not addressed. 

    Conclusion 

    To address the critical Xerox vulnerabilities identified as CVE-2025-8355 and CVE-2025-8356, organizations are strongly advised to upgrade to FreeFlow Core version 8.0.5 immediately, as it contains essential patches to prevent SSRF and remote code execution attacks.  

    The update is available through Xerox’s official support channels. In addition to applying the patch, system administrators should audit current deployments, enforce proper network segmentation, implement strict input validation for XML processing, and monitor logs for unusual activity.  

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article6 Lessons Learned: Focusing Security Where Business Value Lives
    Next Article BadCam Attack Turns Trusted Linux Webcams into Stealthy USB Weapons

    Related Posts

    Development

    PHP 8.5.0 RC 1 available for testing

    September 26, 2025
    Development

    Terraform Code Generator Using Ollama and CodeGemma

    September 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    A Reader’s Question on Nested Lists

    News & Updates

    Rilasciata Debian 12.11: Aggiornamento di Sicurezza e Stabilità

    Linux

    Multiple SonicWall SMA 100 Vulnerabilities Let Attackers Compromise Systems

    Security

    GitHub for Beginners: Building a React App with GitHub Copilot

    News & Updates

    Highlights

    CVE-2025-4465 – iSourcecode Gym Management System SQL Injection Vulnerability

    May 9, 2025

    CVE ID : CVE-2025-4465

    Published : May 9, 2025, 6:15 a.m. | 25 minutes ago

    Description : A vulnerability was found in itsourcecode Gym Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /ajax.php?action=save_schedule. The manipulation of the argument member_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

    Severity: 7.3 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    You can style alt text like any other text

    May 22, 2025

    ChatGPT Is Making People Think They’re Gods and Their Families Are Terrified

    May 9, 2025

    CVE-2025-9382 – FNKvision Y215 CCTV Camera Telnet Service Backdoor Vulnerability

    August 24, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.