CVE-2025-10875: CWE-1427 Improper Neutralization of Input Used for LLM Prompting in Salesforce Mulesoft Anypoint Code Builder
Improper Neutralization of Input Used for LLM Prompting vulnerability in Salesforce Mulesoft Anypoint Code Builder allows Code Injection.This issue affects Mulesoft Anypoint Code Builder: before 1.11.6.
AI Analysis
Technical Summary
CVE-2025-10875 identifies a vulnerability in Salesforce Mulesoft Anypoint Code Builder versions before 1.11.6, classified under CWE-1427, which concerns improper neutralization of input used for LLM prompting. The vulnerability arises because the product fails to adequately sanitize or validate input that is fed into large language model prompts, which are used to assist or automate code generation within the development environment. This improper neutralization can lead to code injection attacks, where an attacker crafts malicious input that manipulates the LLM’s output or execution context, potentially injecting unauthorized code snippets or commands. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its attack surface. The CVSS v3.1 base score of 6.5 reflects a network attack vector with low attack complexity and no privileges or user interaction needed. The impact primarily affects confidentiality and integrity, as attackers could cause unauthorized code execution or data leakage within the code builder environment, but availability is not impacted. No public exploits or active exploitation have been reported yet. The vulnerability highlights the risks introduced by integrating AI/LLM components into development tools without robust input validation and sanitization. Salesforce has addressed this issue in version 1.11.6 and later.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of code development processes that utilize Mulesoft Anypoint Code Builder. Attackers exploiting this flaw could inject malicious code into the development environment, potentially leading to compromised software builds, introduction of backdoors, or leakage of proprietary source code and sensitive configuration data. This could undermine trust in software supply chains and lead to intellectual property theft or further downstream attacks. Although availability is not directly impacted, the integrity compromise could have cascading effects on operational security and compliance, especially in regulated sectors such as finance, healthcare, and critical infrastructure. Organizations relying heavily on Salesforce and Mulesoft tools for integration and development are particularly vulnerable. The lack of required authentication and user interaction for exploitation increases the urgency of mitigation. The threat is more pronounced in environments where code builders are integrated into CI/CD pipelines without additional security controls.
Mitigation Recommendations
European organizations should immediately upgrade Mulesoft Anypoint Code Builder to version 1.11.6 or later, where the vulnerability is patched. In addition to patching, organizations should implement strict input validation and sanitization policies on any data fed into LLM prompts within development tools. Employing runtime monitoring and anomaly detection to identify unusual code generation patterns can help detect exploitation attempts. Restrict network access to the code builder environment using segmentation and firewall rules to limit exposure. Integrate code review and static analysis tools to catch injected malicious code early in the development lifecycle. Educate developers about the risks of untrusted input in AI-assisted coding environments. Finally, maintain an inventory of all development tools using LLMs and monitor vendor advisories for emerging threats related to AI prompt injection.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-10875: CWE-1427 Improper Neutralization of Input Used for LLM Prompting in Salesforce Mulesoft Anypoint Code Builder
Description
Improper Neutralization of Input Used for LLM Prompting vulnerability in Salesforce Mulesoft Anypoint Code Builder allows Code Injection.This issue affects Mulesoft Anypoint Code Builder: before 1.11.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-10875 identifies a vulnerability in Salesforce Mulesoft Anypoint Code Builder versions before 1.11.6, classified under CWE-1427, which concerns improper neutralization of input used for LLM prompting. The vulnerability arises because the product fails to adequately sanitize or validate input that is fed into large language model prompts, which are used to assist or automate code generation within the development environment. This improper neutralization can lead to code injection attacks, where an attacker crafts malicious input that manipulates the LLM’s output or execution context, potentially injecting unauthorized code snippets or commands. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its attack surface. The CVSS v3.1 base score of 6.5 reflects a network attack vector with low attack complexity and no privileges or user interaction needed. The impact primarily affects confidentiality and integrity, as attackers could cause unauthorized code execution or data leakage within the code builder environment, but availability is not impacted. No public exploits or active exploitation have been reported yet. The vulnerability highlights the risks introduced by integrating AI/LLM components into development tools without robust input validation and sanitization. Salesforce has addressed this issue in version 1.11.6 and later.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and confidentiality of code development processes that utilize Mulesoft Anypoint Code Builder. Attackers exploiting this flaw could inject malicious code into the development environment, potentially leading to compromised software builds, introduction of backdoors, or leakage of proprietary source code and sensitive configuration data. This could undermine trust in software supply chains and lead to intellectual property theft or further downstream attacks. Although availability is not directly impacted, the integrity compromise could have cascading effects on operational security and compliance, especially in regulated sectors such as finance, healthcare, and critical infrastructure. Organizations relying heavily on Salesforce and Mulesoft tools for integration and development are particularly vulnerable. The lack of required authentication and user interaction for exploitation increases the urgency of mitigation. The threat is more pronounced in environments where code builders are integrated into CI/CD pipelines without additional security controls.
Mitigation Recommendations
European organizations should immediately upgrade Mulesoft Anypoint Code Builder to version 1.11.6 or later, where the vulnerability is patched. In addition to patching, organizations should implement strict input validation and sanitization policies on any data fed into LLM prompts within development tools. Employing runtime monitoring and anomaly detection to identify unusual code generation patterns can help detect exploitation attempts. Restrict network access to the code builder environment using segmentation and firewall rules to limit exposure. Integrate code review and static analysis tools to catch injected malicious code early in the development lifecycle. Educate developers about the risks of untrusted input in AI-assisted coding environments. Finally, maintain an inventory of all development tools using LLMs and monitor vendor advisories for emerging threats related to AI prompt injection.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-09-23T12:47:52.013Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690a439b6d939959c8fdd563
Added to database: 11/4/2025, 6:19:07 PM
Last enriched: 11/11/2025, 8:12:13 PM
Last updated: 12/18/2025, 2:19:14 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14856: Code Injection in y_project RuoYi
MediumCVE-2025-14841: NULL Pointer Dereference in OFFIS DCMTK
MediumCVE-2025-14837: Code Injection in ZZCMS
MediumKimwolf Botnet Hijacks 1.8 Million Android TVs, Launches Large-Scale DDoS Attacks
MediumCVE-2025-14836: Cleartext Storage in a File or on Disk in ZZCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.