What's Happening?
Xerox has addressed two critical vulnerabilities in its FreeFlow Core print orchestration platform, which were discovered by researchers at Horizon3. The vulnerabilities, identified as an XXE injection flaw (CVE-2025-8355) and a path traversal issue (CVE-2025-8356), could allow unauthenticated remote attackers to execute arbitrary code on affected systems. FreeFlow Core is widely used for prepress automation workflows by organizations such as universities, marketing firms, and government agencies. The vulnerabilities were reported to Xerox in June, and patches were released on August 8, 2025, in version 8.0.5 of FreeFlow Core.
Why It's Important?
The vulnerabilities in Xerox's FreeFlow Core highlight the ongoing security challenges faced by organizations relying on complex software systems. The potential for remote code execution poses significant risks, particularly for entities handling sensitive pre-public information. The swift response by Xerox to patch these vulnerabilities underscores the importance of proactive cybersecurity measures. Organizations using FreeFlow Core must update to the latest version to protect against potential exploitation, which could lead to data breaches or unauthorized access to critical systems.
What's Next?
Organizations using FreeFlow Core are advised to apply the latest patches immediately to mitigate the risk of exploitation. Cybersecurity teams should remain vigilant for any signs of attempted breaches and ensure that all systems are regularly updated. The incident may prompt other companies to review their own security protocols and patch management processes to prevent similar vulnerabilities from being exploited.