Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

Salesforce AI Agent Vulnerability Allows Let Attackers Exfiltration Sensitive Data

Posted on September 25, 2025September 25, 2025 By CWS

A important vulnerability chain in Salesforce’s Agentforce AI platform, which might have allowed exterior attackers to steal delicate CRM knowledge.

The vulnerability, dubbed ForcedLeak by Noma Labs, which found it, carries a CVSS rating of 9.4 and was executed via a complicated oblique immediate injection assault.

This discovery highlights the expanded and essentially completely different assault floor introduced by autonomous AI brokers in comparison with conventional methods.

Upon notification from Noma Labs, Salesforce promptly investigated the problem and has since deployed patches. The repair prevents Agentforce brokers from sending knowledge to untrusted URLs, addressing the speedy danger.

The analysis demonstrates how AI brokers will be compromised via malicious directions hidden inside what are usually thought of trusted knowledge sources.

ForcedLeak Assault

The assault exploited a number of weaknesses, together with inadequate context validation, overly permissive AI mannequin conduct, and a important Content material Safety Coverage (CSP) bypass.

Attackers might create a malicious Net-to-Lead submission containing unauthorized instructions. When the AI agent processed this lead, the Giant Language Mannequin (LLM) handled the malicious directions as respectable, resulting in the exfiltration of delicate knowledge.

The LLM was unable to distinguish between trusted knowledge loaded into its context and the attacker’s embedded directions.

The assault vector was an oblique immediate injection. Not like a direct injection, the place an attacker inputs instructions straight into the AI, this methodology entails embedding malicious directions in knowledge that the AI will later course of throughout a routine job.

On this case, the attacker positioned a payload within the “Description” discipline of an internet kind, which was then saved within the CRM. When an worker requested the AI agent to evaluate the lead, the agent executed the hidden instructions.

A key issue within the success of this assault was the invention of a flaw in Salesforce’s Content material Safety Coverage. The researchers discovered that the area my-salesforce-cms.com was whitelisted however had expired and was out there for buy.

By buying this area, an attacker might set up a trusted channel for knowledge exfiltration. The AI agent, following its directions, would ship delicate knowledge to this attacker-controlled area, bypassing safety controls that may usually block such actions, Noma Labs stated.

Salesforce has since re-secured the expired area and applied stricter safety controls, together with Trusted URLs Enforcement for each Agentforce and Einstein AI, to stop comparable points.

If exploited, ForcedLeak might have had extreme penalties. The vulnerability risked exposing confidential buyer contact info, gross sales pipeline knowledge, inside communications, and historic interplay information.

Any group utilizing Salesforce Agentforce with the Net-to-Lead function enabled was doubtlessly susceptible, particularly these in gross sales and advertising who frequently course of exterior lead knowledge.

Salesforce recommends that clients take the next actions:

Apply the really helpful updates to implement Trusted URLs for Agentforce and Einstein AI.

Audit current lead knowledge for any suspicious submissions containing uncommon directions.

Implement strict enter validation and sanitize all knowledge from untrusted sources.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Agent, Attackers, Data, Exfiltration, Salesforce, Sensitive, Vulnerability

Post navigation

Previous Post: Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets
Next Post: Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network

Related Posts

Anthropic Accuses Chinese AI Labs of Distillation Attacks Anthropic Accuses Chinese AI Labs of Distillation Attacks Cyber Security News
How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  How SOC Teams Reduce MTTD And MTTR With Threat Context Enrichment  Cyber Security News
Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV Cyber Security News
WebKit Exploit Forces iOS Safari Users onto Scam Pages WebKit Exploit Forces iOS Safari Users onto Scam Pages Cyber Security News
Critical Chrome Zero-Day Vulnerability PoC Released Critical Chrome Zero-Day Vulnerability PoC Released Cyber Security News
800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks 800K+ GNU InetUtils telnetd Instances Exposed to RCE Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark