Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8055: CWE-918 Server-Side Request Forgery (SSRF) in OpenText™ XM Fax

0
Medium
VulnerabilityCVE-2025-8055cvecve-2025-8055cwe-918
Published: Thu Feb 19 2026 (02/19/2026, 22:21:06 UTC)
Source: CVE Database V5
Vendor/Project: OpenText™
Product: XM Fax

Description

CVE-2025-8055 is a Server-Side Request Forgery (SSRF) vulnerability affecting OpenText™ XM Fax version 24. 2. This flaw allows an attacker with limited privileges on the XM Fax server to induce the server to make HTTP requests to internal or external systems accessible from the server. The vulnerability is classified as CWE-918 and has a CVSS 4. 0 base score of 5. 3, indicating medium severity. Exploitation does not require user interaction but does require some level of privileges on the server. The SSRF is blind, meaning attackers may not receive direct response data but can leverage the vulnerability for network reconnaissance or to pivot attacks within the internal network. No known public exploits or patches have been reported yet. Organizations using XM Fax 24.

AI-Powered Analysis

AILast updated: 02/19/2026, 22:46:51 UTC

Technical Analysis

CVE-2025-8055 is a Server-Side Request Forgery (SSRF) vulnerability identified in OpenText™ XM Fax version 24.2. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted HTTP requests to arbitrary internal or external resources, potentially bypassing network access controls. In this case, the vulnerability allows an attacker with limited privileges on the XM Fax server to perform blind SSRF attacks, meaning the attacker can trigger requests but does not directly see the response content. This can be exploited to scan internal networks, access sensitive internal services, or interact with systems that are otherwise inaccessible externally. The vulnerability is tracked under CWE-918, which covers SSRF issues. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning some privileges are needed but not administrative), no user interaction (UI:N), and partial impact on confidentiality (R:A) and availability (V:D). The vulnerability does not affect integrity or require authentication beyond limited privileges. No public exploits or patches have been published as of now, but the vulnerability is officially published and recognized. Given the nature of XM Fax as a communication tool often integrated into enterprise environments, exploitation could facilitate lateral movement or reconnaissance within corporate networks.

Potential Impact

The primary impact of CVE-2025-8055 is the potential for attackers to leverage the XM Fax server as a pivot point to access internal network resources that are otherwise protected by firewalls or network segmentation. This can lead to unauthorized information disclosure, such as accessing internal web services, metadata, or administrative interfaces not exposed externally. Additionally, attackers could use the SSRF to perform denial-of-service attacks on internal systems by flooding them with requests. Although the vulnerability does not directly compromise data integrity or system availability on XM Fax itself, it significantly increases the attack surface and can be a stepping stone for more severe attacks, including data exfiltration or lateral movement to critical systems. Organizations relying on XM Fax for sensitive communications or integrated with other internal systems are at heightened risk. The medium CVSS score reflects moderate severity but should not be underestimated in environments with sensitive internal networks.

Mitigation Recommendations

To mitigate CVE-2025-8055, organizations should: 1) Apply any official patches or updates from OpenText as soon as they become available. 2) Restrict access to the XM Fax server to trusted users and networks, minimizing the number of accounts with privileges on the server. 3) Implement strict network segmentation and firewall rules to limit the XM Fax server's ability to initiate outbound requests to sensitive internal systems. 4) Monitor and log outbound requests from the XM Fax server to detect unusual or unauthorized access attempts. 5) Employ web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block SSRF patterns. 6) Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities. 7) Review and harden the configuration of XM Fax to disable unnecessary features that could be exploited for SSRF. 8) Educate administrators about the risks of SSRF and the importance of least privilege principles on the XM Fax server.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
OpenText
Date Reserved
2025-07-22T13:07:46.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69978f65d7880ec89b384552

Added to database: 2/19/2026, 10:32:05 PM

Last enriched: 2/19/2026, 10:46:51 PM

Last updated: 2/20/2026, 1:34:20 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats