Description
In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints.
INFO
Published Date :
2025-01-23T17:03:33.187Z
Last Modified :
2025-09-17T16:49:42.753Z
Source :
Xerox
AFFECTED PRODUCTS
The following products are affected by CVE-2024-55925 vulnerability.
| Vendors | Products |
|---|---|
| Xerox |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-55925.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact