Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Vulnerabilities in Xerox Print Orchestration Product Allow Remote Code Execution

Path traversal and XXE injection flaws allowing unauthenticated remote code execution have been patched in Xerox FreeFlow Core. 

Xerox vulnerabilities

Two serious vulnerabilities were patched recently by Xerox in its FreeFlow Core print orchestration platform. 

According to pentesting company Horizon3, whose researchers discovered the flaws, FreeFlow Core is affected by an XXE injection flaw (CVE-2025-8355) and a path traversal issue (CVE-2025-8356).

The researchers discovered that the vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected FreeFlow Core instances.

The potential impact has been demonstrated with an exploit that placed a webshell on the targeted system.

FreeFlow Core is designed for prepress automation workflows and it’s typically used by organizations with large-scale printing operations, including universities, packaging and marketing firms, and even government agencies, according to Horizon3. 

“Given the nature of the product, FreeFlow Core installations have a lot of moving parts and require relatively open access and availability, which combined with the fact that print jobs of this kind generally contain pre-public information around marketing campaigns makes this an ideal target for attackers,” the security firm warned.

Advertisement. Scroll to continue reading.

The vulnerabilities were reported to Xerox in June and they were patched on August 8, when the vendor published an advisory to inform customers about the availability of patches. Fixes are included in FreeFlow Core version 8.0.5.

Earlier this year, researchers disclosed vulnerabilities in Xerox VersaLink multifunction printers that could allow attackers to retrieve authentication credentials, which could then be used for lateral movement.

Related: New Vulnerabilities Expose Millions of Brother Printers to Hacking

Related: Printer Company Procolored Served Infected Software for Months

Related: Critical Vulnerability Found in Canon Printer Drivers

Related: Fortinet, Ivanti Release August 2025 Security Patches

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.