Xerox has issued a security upgrade for critical and high-severity vulnerabilities in its FreeFlow Core product that researchers said could have allowed an attacker to remotely execute code.
Xerox FreeFlow Core is a print orchestration platform that handles prepress automation workflows, and it is often used by organizations that require large print operations, including packaging companies, marketing campaigns, universities and government agencies.
Horizon3.ai, a San Francisco-based pentesting and red team specialist, discovered recently that the software contained two serious flaws: a critical path traversal vulnerability, tracked as CVE-2025-8356, with a CVSS score of 9.8, that could have allowed an attacker to gain remote code execution; and a second vulnerability, tracked as CVE-2025-8355, with a CVSS score of 7.5, that involved improper handling of XML input and could have led to server-side request forgery attacks.
Horizon3.ai researchers said they learned of the issue in June after one of the company’s customers reported unusual network activity.
The customer described what it thought were false positives, as Horizon3.ai’s NodeZero security software was receiving alerts that an XML External Entity was being exploited on one of the customer’s machines. After investigating the incident alongside the customer, Horizon3.ai traced the issue to the two flaws in Xerox’s software.
“Xerox is aware of the recent remote code execution vulnerabilities (CVE-2025-8355 and CVE-2025-8356) and has made a software update available to our clients that mitigates the remote code execution vulnerabilities,” a Xerox spokeperson told Cybersecurity Dive. “ We are actively monitoring for these situations to ensure swift resolution and remain committed to upholding strong security standards.”
Xerox’s Aug. 8 security bulletin urged customers to upgrade to FreeFlow Core version 8.0.5., which contains patches for the vulnerabilities.
“As these flaws are trivial to exploit, the recommended mitigation is to upgrade to a patched version as soon as possible,” said Jimi Sebree, security researcher at Horizon3.ai.
Printer vulnerabilities are often considered very serious, because printing components typically require open access to other systems and thus could expose those systems to intrusions, if compromised.
Sebree said customers with systems that cannot easily be patched should consider limiting access to the JMF Client service listening on Port 4004 by default.
Editor’s note: Updates with comment from Xerox.