Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Salesforce Tableau Vulnerabilities Let Attackers Execute Code Remotely

Posted on July 28, 2025July 28, 2025 By CWS

A number of important safety vulnerabilities affecting Salesforce’s Tableau Server that would enable attackers to execute distant code, bypass authorization controls, and entry delicate manufacturing databases. 

The vulnerabilities, revealed by a safety advisory revealed on June 26, 2025, impression Tableau Server variations earlier than 2025.1.3, earlier than 2024.2.12, and earlier than 2023.3.19, prompting pressing requires instant patching throughout enterprise environments.

Key Takeaways1. Eight important vulnerabilities have an effect on Tableau Server variations earlier than 2025.1.3, 2024.2.12, and 2023.3.192. Allows distant code execution and unauthorized database entry.3. Improve to the newest supported model now

Excessive-Severity Flaws in A number of Tableau Elements

The safety vulnerabilities span throughout numerous Tableau Server modules, presenting a complete assault floor that risk actors might exploit. 

Essentially the most extreme vulnerability, CVE-2025-52449, carries a CVSS 3.1 base rating of 8.5 and originates from unrestricted file add capabilities throughout the Extensible Protocol Service modules. 

This flaw allows Distant Code Execution (RCE) by various execution strategies as a consequence of misleading filenames, doubtlessly permitting attackers to achieve full system management.

Three extra authorization bypass vulnerabilities (CVE-2025-52446, CVE-2025-52447, and CVE-2025-52448), every scoring 8.0 on the CVSS scale, have an effect on the tab-doc API modules, set-initial-sql tabdoc command modules, and validate-initial-sql API modules, respectively. 

These vulnerabilities exploit user-controlled keys to control interfaces, granting unauthorized entry to manufacturing database clusters containing delicate organizational information.

Server-Facet Request Forgery and Path Traversal Flaws

Server-Facet Request Forgery (SSRF) vulnerabilities characterize one other important assault vector, with three separate CVEs recognized throughout completely different elements. 

CVE-2025-52453 (CVSS 8.2) impacts Circulation Knowledge Supply modules, whereas CVE-2025-52454 (CVSS 8.2) impacts Amazon S3 Connector modules. 

The third SSRF vulnerability, CVE-2025-52455 (CVSS 8.1), targets EPS Server modules. 

These vulnerabilities allow useful resource location spoofing, permitting attackers to control server requests and doubtlessly entry inner methods.

A big path traversal vulnerability designated as CVE-2025-52452 (CVSS 8.5) impacts the tabdoc API duplicate-data-source modules. 

This improper limitation of pathname restrictions allows absolute path traversal assaults, doubtlessly exposing delicate information throughout the server filesystem by listing traversal methods.

CVE IDVulnerability TitleCVSS 3.1 ScoreSeverityCVE-2025-52446Authorization Bypass By Consumer-Managed Key8.0HighCVE-2025-52447Authorization Bypass By Consumer-Managed Key8.0HighCVE-2025-52448Authorization Bypass By Consumer-Managed Key8.0HighCVE-2025-52449Unrestricted Add of File with Harmful Type8.5HighCVE-2025-52452Improper Limitation of a Pathname to a Restricted Directory8.5HighCVE-2025-52453Server-Facet Request Forgery (SSRF)8.2HighCVE-2025-52454Server-Facet Request Forgery (SSRF)8.2HighCVE-2025-52455Server-Facet Request Forgery (SSRF)8.1High

Mitigations

Salesforce strongly advises all Tableau Server clients to implement instant remediation measures. 

Organizations ought to replace to the newest supported Upkeep Launch inside their present department, out there by the official Tableau Server Upkeep Launch web page. 

Moreover, clients using Trino (previously Presto) drivers should replace to the newest driver model to make sure complete safety.

For enterprises working unsupported Tableau Server variations, Salesforce recommends upgrading to appropriate supported variations to keep up entry to important safety updates and technical help. 

Expertise quicker, extra correct phishing detection and enhanced safety for what you are promoting with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Attackers, Code, Critical, Execute, Remotely, Salesforce, Tableau, Vulnerabilities

Post navigation

Previous Post: Critical Flaws in Niagara Framework Threaten Smart Buildings and Industrial Systems Worldwide
Next Post: Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure

Related Posts

Jenkins Gatling Plugin Vulnerability Let Attackers Bypass Content-Security-Policy Protection Cyber Security News
New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild Cyber Security News
Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link Cyber Security News
Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
5 Common Back-to-School Online Scams Powered Using AI and How to Avoid Them Cyber Security News
Speaker Proposal Deadline Approaches for OpenSSL Conference 2025 in Prague Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • 113,000 Impacted by Data Breach at Virginia Mental Health Authority
  • IoT Security Firm Exein Raises €100 Million
  • Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data
  • SonicWall Patches Exploited SMA 1000 Zero-Day

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Hijacking VNC Connections to Gain Access to OT Control Devices in Critical Infrastructure
  • 113,000 Impacted by Data Breach at Virginia Mental Health Authority
  • IoT Security Firm Exein Raises €100 Million
  • Phantom Stealer Attacking Users to Steal Sensitive Data like Passwords, Browser Cookies, Credit Card Data
  • SonicWall Patches Exploited SMA 1000 Zero-Day

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark