CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-26496 is a critical vulnerability classified as CWE-843 (Access of Resource Using Incompatible Type, commonly known as 'Type Confusion') affecting Salesforce's Tableau Server and Tableau Desktop products on Windows and Linux platforms. The vulnerability resides in the File Upload modules of these applications and allows for Local Code Inclusion (LCI). Specifically, this type confusion flaw enables an attacker to manipulate the way resources are accessed or interpreted by the software, leading to the inclusion and execution of unauthorized local code. The affected versions include all releases prior to Tableau Server 2025.1.3, Tableau Desktop 2024.2.12, and Tableau Desktop 2023.3.19. The vulnerability has a CVSS v3.1 base score of 9.3, indicating a critical severity level. The vector string (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that exploitation requires local access (AV:L) but no privileges (PR:N) or user interaction (UI:N), and the impact spans confidentiality, integrity, and availability with a scope change (S:C). Although no known exploits are currently reported in the wild, the potential for severe damage is significant due to the ability to execute arbitrary code locally, which could be leveraged to escalate privileges or move laterally within an environment. Tableau Server and Desktop are widely used business intelligence and data visualization tools, often integrated into enterprise environments for sensitive data analysis and reporting. The File Upload module is a critical component that handles user-submitted content, making it a high-value target for attackers seeking to exploit this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-26496 could be substantial. Tableau is commonly deployed in sectors such as finance, healthcare, manufacturing, and government agencies across Europe, where sensitive data confidentiality and integrity are paramount. Exploitation of this vulnerability could allow attackers with local access to execute arbitrary code, potentially leading to unauthorized data access, data manipulation, or disruption of analytics services. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), operational downtime, and reputational damage. Given the critical nature of the vulnerability and the broad impact on confidentiality, integrity, and availability, organizations using vulnerable Tableau versions face a heightened risk of targeted attacks, especially in environments where Tableau servers are accessible to multiple users or integrated with other critical systems.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all Tableau Server and Tableau Desktop instances, including version numbers, to assess exposure. 2) Prioritize patching by upgrading to the fixed versions: Tableau Server 2025.1.3 or later, Tableau Desktop 2024.2.12 or later, and Tableau Desktop 2023.3.19 or later. 3) Restrict local access to Tableau servers and desktops by enforcing strict access controls, limiting user permissions, and employing network segmentation to reduce the attack surface. 4) Monitor file upload activities closely, implementing anomaly detection to identify suspicious uploads or access patterns. 5) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized code execution. 6) Conduct regular security audits and penetration tests focusing on file upload functionalities. 7) Educate administrators and users about the risks associated with local access and the importance of applying security updates promptly. These steps go beyond generic advice by emphasizing access control, monitoring, and proactive detection tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Switzerland, Poland
CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
Description
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-26496 is a critical vulnerability classified as CWE-843 (Access of Resource Using Incompatible Type, commonly known as 'Type Confusion') affecting Salesforce's Tableau Server and Tableau Desktop products on Windows and Linux platforms. The vulnerability resides in the File Upload modules of these applications and allows for Local Code Inclusion (LCI). Specifically, this type confusion flaw enables an attacker to manipulate the way resources are accessed or interpreted by the software, leading to the inclusion and execution of unauthorized local code. The affected versions include all releases prior to Tableau Server 2025.1.3, Tableau Desktop 2024.2.12, and Tableau Desktop 2023.3.19. The vulnerability has a CVSS v3.1 base score of 9.3, indicating a critical severity level. The vector string (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that exploitation requires local access (AV:L) but no privileges (PR:N) or user interaction (UI:N), and the impact spans confidentiality, integrity, and availability with a scope change (S:C). Although no known exploits are currently reported in the wild, the potential for severe damage is significant due to the ability to execute arbitrary code locally, which could be leveraged to escalate privileges or move laterally within an environment. Tableau Server and Desktop are widely used business intelligence and data visualization tools, often integrated into enterprise environments for sensitive data analysis and reporting. The File Upload module is a critical component that handles user-submitted content, making it a high-value target for attackers seeking to exploit this vulnerability.
Potential Impact
For European organizations, the impact of CVE-2025-26496 could be substantial. Tableau is commonly deployed in sectors such as finance, healthcare, manufacturing, and government agencies across Europe, where sensitive data confidentiality and integrity are paramount. Exploitation of this vulnerability could allow attackers with local access to execute arbitrary code, potentially leading to unauthorized data access, data manipulation, or disruption of analytics services. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), operational downtime, and reputational damage. Given the critical nature of the vulnerability and the broad impact on confidentiality, integrity, and availability, organizations using vulnerable Tableau versions face a heightened risk of targeted attacks, especially in environments where Tableau servers are accessible to multiple users or integrated with other critical systems.
Mitigation Recommendations
To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all Tableau Server and Tableau Desktop instances, including version numbers, to assess exposure. 2) Prioritize patching by upgrading to the fixed versions: Tableau Server 2025.1.3 or later, Tableau Desktop 2024.2.12 or later, and Tableau Desktop 2023.3.19 or later. 3) Restrict local access to Tableau servers and desktops by enforcing strict access controls, limiting user permissions, and employing network segmentation to reduce the attack surface. 4) Monitor file upload activities closely, implementing anomaly detection to identify suspicious uploads or access patterns. 5) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized code execution. 6) Conduct regular security audits and penetration tests focusing on file upload functionalities. 7) Educate administrators and users about the risks associated with local access and the importance of applying security updates promptly. These steps go beyond generic advice by emphasizing access control, monitoring, and proactive detection tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-02-11T17:18:13.649Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a8d3f1ad5a09ad002249d3
Added to database: 8/22/2025, 8:32:49 PM
Last enriched: 8/30/2025, 1:02:39 AM
Last updated: 10/7/2025, 1:01:19 PM
Views: 218
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-40889: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Nozomi Networks Guardian
HighCVE-2025-40888: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40887: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumCVE-2025-40886: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
HighCVE-2025-40885: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Nozomi Networks Guardian
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.