{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2252","assignerOrgId":"10b61619-3869-496c-8a1e-f291b0e71e3f","state":"PUBLISHED","assignerShortName":"Xerox","dateReserved":"2026-02-09T14:29:08.541Z","datePublished":"2026-02-27T08:18:17.816Z","dateUpdated":"2026-03-06T15:34:24.049Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"FreeFlow Core","vendor":"Xerox","versions":[{"lessThanOrEqual":"8.0.7","status":"affected","version":"0","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forgery (SSRF) via crafted XML input containing malicious external entity references.\n\n<p><span style=\"background-color: rgb(252, 252, 252);\">This issue affects Xerox FreeFlow Core versions up to and including 8.0.7.&nbsp;</span></p><p><span style=\"background-color: rgb(252, 252, 252);\">Please consider upgrading to FreeFlow Core version 8.1.0 via the software available on -&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://www.support.xerox.com/en-us/product/core/downloads\">https://www.support.xerox.com/en-us/product/core/downloads</a></span>\n\n</p>"}],"value":"An XML External Entity (XXE) vulnerability allows malicious user to perform Server-Side Request Forgery (SSRF) via crafted XML input containing malicious external entity references.\n\nThis issue affects Xerox FreeFlow Core versions up to and including 8.0.7. \n\nPlease consider upgrading to FreeFlow Core version 8.1.0 via the software available on -  https://www.support.xerox.com/en-us/product/core/downloads"}],"impacts":[{"capecId":"CAPEC-201","descriptions":[{"lang":"en","value":"CAPEC-201 Serialized Data External Linking"}]},{"capecId":"CAPEC-664","descriptions":[{"lang":"en","value":"CAPEC-664 Server Side Request Forgery"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-611","description":"CWE-611 Improper Restriction of XML External Entity Reference","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-918","description":"CWE-918 Server-Side Request Forgery (SSRF)","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"10b61619-3869-496c-8a1e-f291b0e71e3f","shortName":"Xerox","dateUpdated":"2026-02-27T08:18:38.491Z"},"references":[{"url":"https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-026-005-for-Xerox-Freeflow-Core.pdf"}],"source":{"discovery":"UNKNOWN"},"title":"XML External Entity (XXE) vulnerability resulting in Server-Side Request Forgery (SSRF)","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-03T19:27:58.048822Z","id":"CVE-2026-2252","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-06T15:34:24.049Z"}}]}}