CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-26496 is a critical vulnerability identified in Salesforce's Tableau Server and Tableau Desktop products, specifically affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19. The vulnerability is classified as CWE-843, which corresponds to 'Access of Resource Using Incompatible Type,' commonly known as a type confusion flaw. This vulnerability arises in the File Upload modules on Windows and Linux platforms. Type confusion vulnerabilities occur when a program accesses a resource using an incorrect or incompatible type, leading to unexpected behavior. In this case, the flaw allows for Local Code Inclusion (LCI), which means an attacker with local access can trick the application into including and executing malicious code or files. The CVSS v3.1 base score is 9.6, indicating a critical severity level. The vector string (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that the attack vector requires local access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could lead to full system compromise, data theft, and disruption of services. The vulnerability affects both Tableau Server and Tableau Desktop, which are widely used data visualization and business intelligence tools, often deployed in enterprise environments for critical data analysis and reporting. The flaw's presence in the file upload functionality is particularly concerning because file upload features are common attack vectors for code injection and execution. This vulnerability underscores the importance of validating and securely handling file inputs and ensuring type safety in software components dealing with resource access.
Potential Impact
For European organizations, the impact of CVE-2025-26496 could be severe. Tableau products are widely adopted across various sectors including finance, healthcare, government, and manufacturing, all of which handle sensitive and regulated data. Exploitation of this vulnerability could lead to unauthorized access to confidential business intelligence data, manipulation or corruption of reports, and potential disruption of critical decision-making processes. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate sensitive data, alter analytics results, or cause denial of service conditions. Given the critical nature of the vulnerability and the lack of required privileges or user interaction, attackers with local access—such as malicious insiders or attackers who have gained initial footholds—could escalate their control significantly. This poses a substantial risk to compliance with European data protection regulations like GDPR, as breaches involving personal or sensitive data could lead to regulatory penalties and reputational damage. Additionally, organizations relying on Tableau for operational dashboards could experience business interruptions, affecting productivity and service delivery.
Mitigation Recommendations
European organizations should prioritize patching affected Tableau Server and Tableau Desktop installations by upgrading to versions 2025.1.3, 2024.2.12, 2023.3.19 or later as soon as patches become available. Until patches are applied, organizations should implement strict access controls to limit local access to Tableau servers and desktops only to trusted personnel. Employing endpoint protection solutions that monitor for suspicious file upload activities or unauthorized code execution can help detect exploitation attempts. Network segmentation should be used to isolate Tableau servers from less trusted network zones and reduce the attack surface. Additionally, organizations should audit and harden file upload configurations, ensuring that only necessary file types are accepted and that uploaded files are scanned for malware. Monitoring logs for unusual file upload or execution behavior is critical for early detection. Implementing application whitelisting and restricting execution permissions in directories used by Tableau for file uploads can further reduce risk. Finally, conducting regular security assessments and penetration testing focused on file upload functionalities will help identify residual weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
Description
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-26496 is a critical vulnerability identified in Salesforce's Tableau Server and Tableau Desktop products, specifically affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19. The vulnerability is classified as CWE-843, which corresponds to 'Access of Resource Using Incompatible Type,' commonly known as a type confusion flaw. This vulnerability arises in the File Upload modules on Windows and Linux platforms. Type confusion vulnerabilities occur when a program accesses a resource using an incorrect or incompatible type, leading to unexpected behavior. In this case, the flaw allows for Local Code Inclusion (LCI), which means an attacker with local access can trick the application into including and executing malicious code or files. The CVSS v3.1 base score is 9.6, indicating a critical severity level. The vector string (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that the attack vector requires local access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could lead to full system compromise, data theft, and disruption of services. The vulnerability affects both Tableau Server and Tableau Desktop, which are widely used data visualization and business intelligence tools, often deployed in enterprise environments for critical data analysis and reporting. The flaw's presence in the file upload functionality is particularly concerning because file upload features are common attack vectors for code injection and execution. This vulnerability underscores the importance of validating and securely handling file inputs and ensuring type safety in software components dealing with resource access.
Potential Impact
For European organizations, the impact of CVE-2025-26496 could be severe. Tableau products are widely adopted across various sectors including finance, healthcare, government, and manufacturing, all of which handle sensitive and regulated data. Exploitation of this vulnerability could lead to unauthorized access to confidential business intelligence data, manipulation or corruption of reports, and potential disruption of critical decision-making processes. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate sensitive data, alter analytics results, or cause denial of service conditions. Given the critical nature of the vulnerability and the lack of required privileges or user interaction, attackers with local access—such as malicious insiders or attackers who have gained initial footholds—could escalate their control significantly. This poses a substantial risk to compliance with European data protection regulations like GDPR, as breaches involving personal or sensitive data could lead to regulatory penalties and reputational damage. Additionally, organizations relying on Tableau for operational dashboards could experience business interruptions, affecting productivity and service delivery.
Mitigation Recommendations
European organizations should prioritize patching affected Tableau Server and Tableau Desktop installations by upgrading to versions 2025.1.3, 2024.2.12, 2023.3.19 or later as soon as patches become available. Until patches are applied, organizations should implement strict access controls to limit local access to Tableau servers and desktops only to trusted personnel. Employing endpoint protection solutions that monitor for suspicious file upload activities or unauthorized code execution can help detect exploitation attempts. Network segmentation should be used to isolate Tableau servers from less trusted network zones and reduce the attack surface. Additionally, organizations should audit and harden file upload configurations, ensuring that only necessary file types are accepted and that uploaded files are scanned for malware. Monitoring logs for unusual file upload or execution behavior is critical for early detection. Implementing application whitelisting and restricting execution permissions in directories used by Tableau for file uploads can further reduce risk. Finally, conducting regular security assessments and penetration testing focused on file upload functionalities will help identify residual weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-02-11T17:18:13.649Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a8d3f1ad5a09ad002249d3
Added to database: 8/22/2025, 8:32:49 PM
Last enriched: 8/22/2025, 8:48:58 PM
Last updated: 8/23/2025, 4:00:13 AM
Views: 10
Related Threats
CVE-2025-43765: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-9131: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ogulo Ogulo – 360° Tour
MediumCVE-2025-9048: CWE-73 External Control of File Name or Path in wptobe Wptobe-memberships
HighCVE-2025-8062: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wen-solutions WS Theme Addons
MediumCVE-2025-7957: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in surror ShortcodeHub – MultiPurpose Shortcode Builder
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.