CVE-2026-2252
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to trick the Xerox FreeFlow Core software into making unauthorized requests to other servers, potentially exposing sensitive information or services. It affects versions up to 8.0.7, so it's important to upgrade to version 8.1.0 to protect against this risk.
Technical Description
An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forgery (SSRF) via crafted XML input containing malicious external entity references. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7. Please consider upgrading to FreeFlow Core version 8.1.0 via the software available on - https://www.support.xerox.com/en-us/product/core/downloads
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 27, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
xerox
Product
freeflow core
Related Vulnerabilities
This vulnerability allows an attacker to access unauthorized files on the system, potentially leading to remote code execution, which means they could run malicious software on the affected Xerox FreeFlow Core software. It affects versions up to 8.0.7, so upgrading to version 8.1.0 is crucial to protect against this risk.
An attacker can gain unauthorized access to sensitive API endpoints in Xerox Workplace Suite by tricking the system into accepting a fake Host header. This vulnerability occurs if the server doesn't properly check the Host header, allowing the attacker to bypass restrictions meant to limit access to specific hosts.