CVE-2025-8355

7.5 HIGH

📋 TL;DR

Xerox FreeFlow Core version 8.0.4 has an XML External Entity (XXE) vulnerability that allows Server-Side Request Forgery (SSRF). Attackers can inject malicious XML to make the server request internal URLs, potentially accessing sensitive internal systems. Organizations using Xerox FreeFlow Core 8.0.4 are affected.

💻 Affected Systems

Products:
  • Xerox FreeFlow Core
Versions: 8.0.4
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Only version 8.0.4 is confirmed vulnerable; earlier versions may also be affected but not specified.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of internal network via SSRF to access sensitive systems, data exfiltration, or lateral movement to critical infrastructure.

🟠

Likely Case

Information disclosure from internal services, scanning of internal network, or limited data access via SSRF.

🟢

If Mitigated

Limited impact with proper network segmentation and XML input validation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XXE to SSRF is a well-known attack pattern with low complexity; exploitation likely requires network access to the vulnerable service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.0.5

Vendor Advisory: https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf

Restart Required: Yes

Instructions:

1. Download Xerox FreeFlow Core version 8.0.5 from official sources. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the service or server as required.

🔧 Temporary Workarounds

Disable XML External Entity Processing

all

Configure the XML parser to disable external entity resolution to prevent XXE attacks.

Specific commands depend on the XML parser implementation; consult Xerox documentation for configuration options.

Network Segmentation

all

Restrict network access to the FreeFlow Core server to limit SSRF impact.

Use firewall rules to block outbound requests from FreeFlow Core to internal networks except necessary services.

🧯 If You Can't Patch

  • Implement strict input validation to reject XML with external entity references.
  • Deploy a web application firewall (WAF) with rules to detect and block XXE payloads.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Xerox FreeFlow Core; if it is 8.0.4, it is vulnerable.

Check Version:

Consult Xerox FreeFlow Core administration interface or documentation for version check command; typically via web UI or system logs.

Verify Fix Applied:

Verify that the version has been updated to 8.0.5 or later, and test XML input handling for XXE vulnerabilities.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors, unexpected outbound HTTP requests from the server, or logs showing access to internal URLs.

Network Indicators:

  • Outbound requests from FreeFlow Core server to internal IPs or unusual ports, especially in response to XML input.

SIEM Query:

source="FreeFlow Core" AND (event="XML parse error" OR dest_ip IN [internal_network_range])

🔗 References

📤 Share & Export