Metrics
Affected Vendors & Products
Sat, 28 Feb 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xerox
Xerox workplace Suite |
|
| CPEs | cpe:2.3:a:xerox:workplace_suite:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Xerox
Xerox workplace Suite |
Wed, 17 Sep 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 |
Wed, 17 Sep 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-290 |
Mon, 24 Feb 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 29 Jan 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 29 Jan 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 27 Jan 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | API Security bypass through header manipulation | In Xerox Workplace Suite, an API restricted to specific hosts can be bypassed by manipulating the Host header. If the server improperly validates or trusts the Host header without verifying the actual destination, an attacker can forge a value to gain unauthorized access. This exploit targets improper host validation, potentially exposing sensitive API endpoints. |
Thu, 23 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | API Security bypass through header manipulation | |
| Title | API Security bypass through header manipulation | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Xerox
Published:
Updated: 2025-09-17T16:49:42.753Z
Reserved: 2024-12-13T14:30:30.206Z
Link: CVE-2024-55925
Updated: 2025-01-23T18:57:07.683Z
Status : Analyzed
Published: 2025-01-23T17:15:15.380
Modified: 2026-02-28T01:19:44.767
Link: CVE-2024-55925
No data.
OpenCVE Enrichment
No data.