Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2251: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Xerox FreeFlow Core

0
Critical
VulnerabilityCVE-2026-2251cvecve-2026-2251cwe-22
Published: Fri Feb 27 2026 (02/27/2026, 08:08:52 UTC)
Source: CVE Database V5
Vendor/Project: Xerox
Product: FreeFlow Core

Description

Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7. Please consider upgrading to FreeFlow Core version 8.1.0 via the software available on - https://www.support.xerox.com/en-us/product/core/downloads https://www.support.xerox.com/en-us/product/core/downloads

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:23:22 UTC

Technical Analysis

CVE-2026-2251 is a critical security vulnerability classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), commonly known as a path traversal flaw, found in Xerox FreeFlow Core software versions up to and including 8.0.7. This vulnerability allows an unauthenticated attacker to manipulate file path inputs to traverse outside of intended directories, bypassing security restrictions. By exploiting this flaw, attackers can access sensitive files and potentially execute arbitrary code remotely on the affected system, leading to full system compromise. The vulnerability does not require any privileges or user interaction, making it highly exploitable over the network. The CVSS 3.1 base score of 9.8 reflects its critical nature, with attack vector as network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). Xerox has addressed this issue in FreeFlow Core version 8.1.0, urging users to upgrade immediately. The vulnerability poses a significant risk to organizations relying on Xerox FreeFlow Core for print workflow automation and document processing, as exploitation could lead to unauthorized data access, system manipulation, and disruption of business operations.

Potential Impact

The impact of CVE-2026-2251 is severe for organizations worldwide using Xerox FreeFlow Core versions up to 8.0.7. Successful exploitation can lead to remote code execution, allowing attackers to gain full control over affected systems. This compromises confidentiality by exposing sensitive documents and system files, integrity by enabling unauthorized modification or deletion of data, and availability by potentially disrupting print workflows or causing system outages. Given the critical role of FreeFlow Core in managing print jobs and document workflows, exploitation could disrupt business continuity, leak confidential information, and facilitate further lateral movement within networks. The lack of authentication and user interaction requirements increases the likelihood of automated attacks and wormable exploits. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a prime target for threat actors aiming to compromise enterprise print infrastructure.

Mitigation Recommendations

Organizations should immediately upgrade Xerox FreeFlow Core to version 8.1.0 or later, as provided by Xerox's official support site, to remediate this vulnerability. Until the upgrade is applied, organizations should restrict network access to FreeFlow Core servers by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. Monitoring and logging of file access and execution events on FreeFlow Core servers should be enhanced to detect suspicious activity indicative of path traversal attempts. Employing intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics for path traversal attacks can provide additional defense. Regularly audit and validate file and directory permissions on the FreeFlow Core server to minimize the impact of potential traversal. Additionally, organizations should review and harden their print workflow security policies and consider isolating print infrastructure from critical business networks. Finally, maintain up-to-date backups of critical data to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Xerox
Date Reserved
2026-02-09T14:29:07.126Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1552332ffcdb8a208e3f4

Added to database: 2/27/2026, 8:26:11 AM

Last enriched: 3/6/2026, 9:23:22 PM

Last updated: 4/13/2026, 12:20:37 PM

Views: 250

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses