CVE-2026-2251
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to access unauthorized files on the system, potentially leading to remote code execution, which means they could run malicious software on the affected Xerox FreeFlow Core software. It affects versions up to 8.0.7, so upgrading to version 8.1.0 is crucial to protect against this risk.
Technical Description
Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7. Please consider upgrading to FreeFlow Core version 8.1.0 via the software available on - https://www.support.xerox.com/en-us/product/core/downloads https://www.support.xerox.com/en-us/product/core/downloads
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 27, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
xerox
Product
freeflow core
Related Vulnerabilities
This vulnerability allows an attacker to trick the Xerox FreeFlow Core software into making unauthorized requests to other servers, potentially exposing sensitive information or services. It affects versions up to 8.0.7, so it's important to upgrade to version 8.1.0 to protect against this risk.
An attacker can gain unauthorized access to sensitive API endpoints in Xerox Workplace Suite by tricking the system into accepting a fake Host header. This vulnerability occurs if the server doesn't properly check the Host header, allowing the attacker to bypass restrictions meant to limit access to specific hosts.