Cyber Posture

CVE-2026-2251

Critical

Published: 27 February 2026

Published
27 February 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Improper limitation of a pathname to a restricted directory (Path Traversal) vulnerability in Xerox FreeFlow Core allows unauthorized path traversal leading to RCE. This issue affects Xerox FreeFlow Core versions up to and including 8.0.7. Please consider upgrading to FreeFlow…

more

Core version 8.1.0 via the software available on - https://www.support.xerox.com/en-us/product/core/downloads https://www.support.xerox.com/en-us/product/core/downloads

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely remediation through application of the vendor patch upgrading to FreeFlow Core 8.1.0.

prevent

Prevents path traversal exploitation by validating pathname inputs to ensure they remain within restricted directories.

prevent

Enforces access restrictions on restricted directories, countering the improper limitation of pathnames that enables unauthorized traversal and RCE.

Security SummaryAI

CVE-2026-2251 is an improper limitation of a pathname to a restricted directory vulnerability, classified under CWE-22 as path traversal, affecting Xerox FreeFlow Core. This flaw enables unauthorized path traversal that leads to remote code execution (RCE). The vulnerability impacts versions up to and including 8.0.7, with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to high confidentiality, integrity, and availability impacts.

An unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows the attacker to traverse restricted directories and execute arbitrary code on the affected system, potentially leading to full compromise of the Xerox FreeFlow Core instance.

Xerox's security bulletin (Xerox-Security-Bulletin-026-005) and advisory recommend upgrading to FreeFlow Core version 8.1.0, available for download at https://www.support.xerox.com/en-us/product/core/downloads. Additional details are provided in the bulletin at https://securitydocs.business.xerox.com/wp-content/uploads/2026/02/Xerox-Security-Bulletin-026-005-for-Xerox-Freeflow-Core.pdf.

Details

CWE(s)

Affected Products

xerox
freeflow core
≤ 8.1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Path traversal vulnerability enables unauthenticated RCE on public-facing Xerox FreeFlow Core application, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References