CVE-2026-2251
Published: 27 February 2026
Description
Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7. Please consider upgrading to FreeFlow…
more
Core version 8.1.0 via the software available on - https://www.support.xerox.com/en-us/product/core/downloads https://www.support.xerox.com/en-us/product/core/downloads
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring timely remediation through application of the vendor patch upgrading to FreeFlow Core 8.1.0.
Prevents path traversal exploitation by validating pathname inputs to ensure they remain within restricted directories.
Enforces access restrictions on restricted directories, countering the improper limitation of pathnames that enables unauthorized traversal and RCE.
Security SummaryAI
CVE-2026-2251 is an improper limitation of a pathname to a restricted directory vulnerability, classified under CWE-22 as path traversal, affecting Xerox FreeFlow Core. This flaw enables unauthorized path traversal that leads to remote code execution (RCE). The vulnerability impacts versions up to and including 8.0.7, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to high confidentiality, integrity, and availability impacts.
An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows the attacker to traverse restricted directories and execute arbitrary code on the affected system, potentially leading to full compromise of the Xerox FreeFlow Core instance.
Xerox's security bulletin (Xerox-Security-Bulletin-026-005) and advisory recommend upgrading to FreeFlow Core version 8.1.0, available for download at https://www.support.xerox.com/en-us/product/core/downloads. Additional details are provided in the bulletin at https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-026-005-for-Xerox-Freeflow-Core.pdf.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal vulnerability enables unauthenticated RCE on public-facing Xerox FreeFlow Core application, directly facilitating T1190: Exploit Public-Facing Application.