CVE-2025-8055: CWE-918 Server-Side Request Forgery (SSRF) in OpenText™ XM Fax
CVE-2025-8055 is a Server-Side Request Forgery (SSRF) vulnerability affecting OpenText™ XM Fax version 24. 2. This flaw allows an attacker with limited privileges on the XM Fax server to induce the server to make HTTP requests to internal or external systems accessible from the server. The vulnerability is classified as CWE-918 and has a CVSS 4. 0 base score of 5. 3, indicating medium severity. Exploitation does not require user interaction but does require some level of privileges on the server. The SSRF is blind, meaning attackers may not receive direct response data but can leverage the vulnerability for network reconnaissance or to pivot attacks within the internal network. No known public exploits or patches have been reported yet. Organizations using XM Fax 24.
AI Analysis
Technical Summary
CVE-2025-8055 is a Server-Side Request Forgery (SSRF) vulnerability identified in OpenText™ XM Fax version 24.2. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted HTTP requests to arbitrary internal or external resources, potentially bypassing network access controls. In this case, the vulnerability allows an attacker with limited privileges on the XM Fax server to perform blind SSRF attacks, meaning the attacker can trigger requests but does not directly see the response content. This can be exploited to scan internal networks, access sensitive internal services, or interact with systems that are otherwise inaccessible externally. The vulnerability is tracked under CWE-918, which covers SSRF issues. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning some privileges are needed but not administrative), no user interaction (UI:N), and partial impact on confidentiality (R:A) and availability (V:D). The vulnerability does not affect integrity or require authentication beyond limited privileges. No public exploits or patches have been published as of now, but the vulnerability is officially published and recognized. Given the nature of XM Fax as a communication tool often integrated into enterprise environments, exploitation could facilitate lateral movement or reconnaissance within corporate networks.
Potential Impact
The primary impact of CVE-2025-8055 is the potential for attackers to leverage the XM Fax server as a pivot point to access internal network resources that are otherwise protected by firewalls or network segmentation. This can lead to unauthorized information disclosure, such as accessing internal web services, metadata, or administrative interfaces not exposed externally. Additionally, attackers could use the SSRF to perform denial-of-service attacks on internal systems by flooding them with requests. Although the vulnerability does not directly compromise data integrity or system availability on XM Fax itself, it significantly increases the attack surface and can be a stepping stone for more severe attacks, including data exfiltration or lateral movement to critical systems. Organizations relying on XM Fax for sensitive communications or integrated with other internal systems are at heightened risk. The medium CVSS score reflects moderate severity but should not be underestimated in environments with sensitive internal networks.
Mitigation Recommendations
To mitigate CVE-2025-8055, organizations should: 1) Apply any official patches or updates from OpenText as soon as they become available. 2) Restrict access to the XM Fax server to trusted users and networks, minimizing the number of accounts with privileges on the server. 3) Implement strict network segmentation and firewall rules to limit the XM Fax server's ability to initiate outbound requests to sensitive internal systems. 4) Monitor and log outbound requests from the XM Fax server to detect unusual or unauthorized access attempts. 5) Employ web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block SSRF patterns. 6) Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities. 7) Review and harden the configuration of XM Fax to disable unnecessary features that could be exploited for SSRF. 8) Educate administrators about the risks of SSRF and the importance of least privilege principles on the XM Fax server.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, Netherlands, Sweden, Switzerland, Singapore
CVE-2025-8055: CWE-918 Server-Side Request Forgery (SSRF) in OpenText™ XM Fax
Description
CVE-2025-8055 is a Server-Side Request Forgery (SSRF) vulnerability affecting OpenText™ XM Fax version 24. 2. This flaw allows an attacker with limited privileges on the XM Fax server to induce the server to make HTTP requests to internal or external systems accessible from the server. The vulnerability is classified as CWE-918 and has a CVSS 4. 0 base score of 5. 3, indicating medium severity. Exploitation does not require user interaction but does require some level of privileges on the server. The SSRF is blind, meaning attackers may not receive direct response data but can leverage the vulnerability for network reconnaissance or to pivot attacks within the internal network. No known public exploits or patches have been reported yet. Organizations using XM Fax 24.
AI-Powered Analysis
Technical Analysis
CVE-2025-8055 is a Server-Side Request Forgery (SSRF) vulnerability identified in OpenText™ XM Fax version 24.2. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted HTTP requests to arbitrary internal or external resources, potentially bypassing network access controls. In this case, the vulnerability allows an attacker with limited privileges on the XM Fax server to perform blind SSRF attacks, meaning the attacker can trigger requests but does not directly see the response content. This can be exploited to scan internal networks, access sensitive internal services, or interact with systems that are otherwise inaccessible externally. The vulnerability is tracked under CWE-918, which covers SSRF issues. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning some privileges are needed but not administrative), no user interaction (UI:N), and partial impact on confidentiality (R:A) and availability (V:D). The vulnerability does not affect integrity or require authentication beyond limited privileges. No public exploits or patches have been published as of now, but the vulnerability is officially published and recognized. Given the nature of XM Fax as a communication tool often integrated into enterprise environments, exploitation could facilitate lateral movement or reconnaissance within corporate networks.
Potential Impact
The primary impact of CVE-2025-8055 is the potential for attackers to leverage the XM Fax server as a pivot point to access internal network resources that are otherwise protected by firewalls or network segmentation. This can lead to unauthorized information disclosure, such as accessing internal web services, metadata, or administrative interfaces not exposed externally. Additionally, attackers could use the SSRF to perform denial-of-service attacks on internal systems by flooding them with requests. Although the vulnerability does not directly compromise data integrity or system availability on XM Fax itself, it significantly increases the attack surface and can be a stepping stone for more severe attacks, including data exfiltration or lateral movement to critical systems. Organizations relying on XM Fax for sensitive communications or integrated with other internal systems are at heightened risk. The medium CVSS score reflects moderate severity but should not be underestimated in environments with sensitive internal networks.
Mitigation Recommendations
To mitigate CVE-2025-8055, organizations should: 1) Apply any official patches or updates from OpenText as soon as they become available. 2) Restrict access to the XM Fax server to trusted users and networks, minimizing the number of accounts with privileges on the server. 3) Implement strict network segmentation and firewall rules to limit the XM Fax server's ability to initiate outbound requests to sensitive internal systems. 4) Monitor and log outbound requests from the XM Fax server to detect unusual or unauthorized access attempts. 5) Employ web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block SSRF patterns. 6) Conduct regular security assessments and penetration tests focusing on SSRF and related vulnerabilities. 7) Review and harden the configuration of XM Fax to disable unnecessary features that could be exploited for SSRF. 8) Educate administrators about the risks of SSRF and the importance of least privilege principles on the XM Fax server.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- OpenText
- Date Reserved
- 2025-07-22T13:07:46.734Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69978f65d7880ec89b384552
Added to database: 2/19/2026, 10:32:05 PM
Last enriched: 2/19/2026, 10:46:51 PM
Last updated: 2/20/2026, 1:34:20 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26980: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in TryGhost Ghost
CriticalCVE-2026-26977: CWE-862: Missing Authorization in frappe lms
MediumCVE-2026-26960: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in isaacs node-tar
HighCVE-2026-26975: CWE-73: External Control of File Name or Path in music-assistant server
HighCVE-2026-26974: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Tygo-van-den-Hurk Slyde
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.