CVE-2025-8356
Published: 08 August 2025
Summary
CVE-2025-8356 is a critical-severity Path Traversal (CWE-22) vulnerability in Xerox Freeflow Core. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents path traversal attacks by validating and sanitizing user-supplied inputs at system entry points to block unauthorized file access.
Addresses the specific flaw in Xerox FreeFlow Core by identifying, reporting, and applying timely remediation such as patches from the vendor bulletin.
Enforces logical access controls to information and system resources, mitigating unauthorized file access even if path traversal inputs are not fully sanitized.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing Xerox FreeFlow Core directly enables T1190 exploitation; escalation to unauthenticated RCE enables arbitrary command execution via T1059.
NVD Description
In Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the attacker to run arbitrary commands on the system.
Deeper analysisAI
CVE-2025-8356 is a Path Traversal vulnerability (CWE-22) affecting Xerox FreeFlow Core version 8.0.4, which enables an attacker to access unauthorized files on the server. This flaw can escalate to Remote Code Execution (CWE-94), allowing arbitrary command execution on the system. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its high impact on confidentiality, integrity, and availability.
A remote, unauthenticated attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation begins with path traversal to read sensitive files, potentially chaining to RCE for full system compromise, including running arbitrary commands.
The Xerox Security Bulletin XSB-025-013 provides mitigation details for FreeFlow Core 8.0.5. Additional attack research context is documented by Horizon3.ai.
Details
- CWE(s)