Loading

Xerox Patches Vulnerability in FreeFlow Core

Xerox has released a critical security update for its FreeFlow Core prepress automation platform after Horizon3.ai uncovered two severe vulnerabilities that could allow remote code execution. The flaws—CVE-2025-8356, a path traversal bug rated 9.8 on the CVSS scale, and CVE-2025-8355, an XML input handling issue rated 7.5—were discovered following unusual network activity reported by a Horizon3.ai customer. Investigators traced the activity to the software, confirming the risk of exploitation.

“Xerox is aware of the recent remote code execution vulnerabilities…and has made a software update available to our clients that mitigates” the risks, the company stated, urging immediate upgrades to version 8.0.5. Horizon3.ai researcher Jimi Sebree warned that “these flaws are trivial to exploit,” advising that unpatched systems should at least restrict access to the JMF Client service on Port 4004. With print servers often deeply integrated into enterprise networks, the vulnerabilities posed a significant exposure for industries relying on FreeFlow Core for large-scale print and packaging operations. 

Learn more.

Add/View comments for this article →


Comments
user