FUJIFILM Business Innovation
Home News Notification about the vulnerability in Xerox FreeFlow Core
Important News

March 17, 2026

Notification about the vulnerability in Xerox FreeFlow Core

Dear customers,

We would like to thank you for your continued support towards FUJIFILM Business Innovation products.
Vulnerabilities (CVE-2026-2251/2252) have been found in Xerox FreeFlow Core, which is included in the Xerox FreeFlow Digital Workflow Collection.

We apologize for any inconvenience this may cause, but please check if your Xerox FreeFlow Core is compatible with the target version, and if so, take the following actions.

At the time of posting this notice, we have not confirmed any attacks that exploit this vulnerability.

Vulnerability Details

We have found the following vulnerabilities in our product Xerox FreeFlow Core that lead to multiple remote code execution.

  • CVE-2026-2251(Critical): Path Traversal leading to Remote Code Execution (RCE)(CWE-22)
  • CVE-2026-2252(High): ML External Entity (XXE) vulnerability resulting in Server-Side Request Forgery (SSRF) (CWE-611, CWE-918)
     
Correspondence

The vulnerability disclosed this time potentially exists in Xerox FreeFlow Core, which our company provides and supports. However, since communication with the printers we support uses IPP, closing the port related to communication with JMF commands does not cause any issues.

Furthermore, as long as the system is operated within the scope of our provided functionalities and under an environment protected by properly configured firewalls, the vulnerability can be mitigated by following the "Workaround" described below.

As a permanent measure, Xerox, which provides FreeFrow Core, provides a separate version of the software to prevent vulnerabilities. 
Once we confirm the quality and are ready to provide it, we will provide the information later.

Workaround

As described above, as long as you are using Xerox FreeFlow Core in an environment protected by a properly configured firewall, you are not at risk from this vulnerability.
In addition, the following measures can be implemented to reduce the risk of vulnerabilities without dependence on the network environment in which Xerox FreeFlow Core is used.

  • Use in a customer network environment protected by a firewall
  • Close port 7751, which is the receiving port for certain messages of JMF (Job Messaging Format) *1.
  • Do not open port 4004, which is the receiving port for certain messages of JMF (Job Messaging Format)*1.

 

  • *1 The following is how to check the status of a specific port (7751/4004) and how to stop if connection is allowed.
Contact Information
  • Customers who have a software support contract
    Please contact the Fujifilm Business Innovation subsidiary/distributor where you purchased your software.
  • Customers who do not have a software support contract
    Please contact the distributor where you purchased your software.