Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Posted on June 10, 2025June 10, 2025 By CWS

Jun 10, 2025Ravie LakshmananVulnerability / SaaS Safety

Cybersecurity researchers have uncovered over 20 configuration-related dangers affecting Salesforce Business Cloud (aka Salesforce Industries), exposing delicate knowledge to unauthorized inside and exterior events.
The weaknesses have an effect on varied parts like FlexCards, Information Mappers, Integration Procedures (IProcs), Information Packs, OmniOut, and OmniScript Saved Classes.
“Low-code platforms comparable to Salesforce Business Cloud make constructing functions simpler, however that comfort can come at a value if safety is not prioritized,” Aaron Costello, chief of SaaS Safety Analysis at AppOmni, mentioned in an announcement shared with The Hacker Information.
These misconfigurations, if left unaddressed, may permit cybercriminals and unauthorized to entry encrypted confidential knowledge on staff and prospects, session knowledge detailing how customers have interacted with Salesforce Business Cloud, credentials for Salesforce and different firm techniques, and enterprise logic.

Following accountable disclosure, Salesforce has addressed three of the shortcomings and issued configuration steering for an additional two. The remaining 16 misconfigurations have been left to the shoppers to repair them on their very own.
The vulnerabilities which were assigned CVE identifiers are listed beneath –

CVE-2025-43697 (CVSS rating: N/A) – If ‘Examine Discipline Degree Safety’ isn’t enabled for ‘Extract’ and ‘Turbo Extract Information Mappers, the ‘View Encrypted Information’ permission test isn’t enforced, exposing cleartext values for the encrypted fields to customers with entry to a given file
CVE-2025-43698 (CVSS rating: N/A) – The SOQL knowledge supply bypasses any Discipline-Degree Safety when fetching knowledge from Salesforce objects
CVE-2025-43699 (CVSS rating: 5.3) – Flexcard doesn’t implement the ‘Required Permissions’ area for the OmniUlCard object
CVE-2025-43700 (CVSS rating: 7.5) – Flexcard doesn’t implement the ‘View Encrypted Information’ permission, returning plaintext values for knowledge that makes use of Basic Encryption
CVE-2025-43701 (CVSS rating: 7.5) – FlexCard permits Visitor Customers to entry values for Customized Settings

Put merely, attackers can weaponize these points to bypass safety controls and extract delicate buyer or worker data.

AppOmni mentioned CVE-2025-43967 and CVE-2025-43698 have been tackled by means of a brand new safety setting known as “EnforceDMFLSAndDataEncryption” that prospects should allow to make sure that solely customers with the “View Encrypted Information” permission might even see the plaintext worth of fields returned by the Information Mapper.

“For organizations topic to compliance mandates comparable to HIPAA, GDPR, SOX, or PCI-DSS, these gaps can characterize actual regulatory publicity,” the corporate mentioned. “And since it’s the buyer’s accountability to securely configure these settings, a single missed setting may result in the breach of 1000’s of information, with no vendor accountability.”
When reached for remark, a Salesforce spokesperson advised The Hacker Information {that a} overwhelming majority of the problems “stem from buyer configuration points” and will not be vulnerabilities inherent to the appliance.
“All points recognized on this analysis have been resolved, with patches made accessible to prospects, and official documentation up to date to replicate full configuration performance,” the corporate mentioned. “Now we have not noticed any proof of exploitation in buyer environments on account of these points.”
The disclosure comes as safety researcher Tobia Righi, who goes by the deal with MasterSplinter, disclosed a Salesforce Object Question Language (SOQL) injection vulnerability that might be exploited to entry delicate consumer knowledge.

The zero-day vulnerability (no CVE) exists in a default aura controller current in all Salesforce deployments, arising on account of a user-controlled “contentDocumentId” parameter that is unsafely embedded into “aura://CsvDataImportResourceFamilyController/ACTION$getCsvAutoMap” that creates a pathway for SOQL injection.
Profitable exploitation of the flaw may have enabled attackers to insert further queries by means of the parameter and extract database contents. The exploit might be additional augmented by passing an inventory of IDs correlated to ContentDocument objects that aren’t public in order to assemble details about uploaded paperwork.
The IDs, Righi mentioned, will be generated by way of a publicly-available brute-force script that may generate potential earlier or subsequent Salesforce IDs primarily based on a sound enter ID. This, in flip, is made potential owing to the truth that Salesforce IDs don’t really present a safety boundary and are literally considerably predictable.
“As famous within the analysis, after receiving the report, our safety staff promptly investigated and resolved the problem. Now we have not noticed any proof of exploitation in buyer environments,” the Salesforce spokesperson mentioned. “We respect Tobia’s efforts to responsibly disclose this subject to Salesforce, and we proceed to encourage the safety analysis neighborhood to report potential points by means of our established channels.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Cloud, Configuration, CVEs, Including, Industry, Researchers, Risks, Salesforce, Uncover

Post navigation

Previous Post: FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings
Next Post: Microsoft Patch Tuesday June 2025

Related Posts

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions The Hacker News
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns The Hacker News
MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks The Hacker News
Taiwan Web Servers Breached by UAT-7237 Using Customized Open-Source Hacking Tools The Hacker News
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models The Hacker News
CISA Adds 3 D-Link Vulnerabilities to KEV Catalog Amid Active Exploitation Evidence The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News