Skip to main content

CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop

Critical
VulnerabilityCVE-2025-26496cvecve-2025-26496cwe-843
Published: Fri Aug 22 2025 (08/22/2025, 20:10:41 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server, Tableau Desktop

Description

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 08/22/2025, 20:48:58 UTC

Technical Analysis

CVE-2025-26496 is a critical vulnerability identified in Salesforce's Tableau Server and Tableau Desktop products, specifically affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19. The vulnerability is classified as CWE-843, which corresponds to 'Access of Resource Using Incompatible Type,' commonly known as a type confusion flaw. This vulnerability arises in the File Upload modules on Windows and Linux platforms. Type confusion vulnerabilities occur when a program accesses a resource using an incorrect or incompatible type, leading to unexpected behavior. In this case, the flaw allows for Local Code Inclusion (LCI), which means an attacker with local access can trick the application into including and executing malicious code or files. The CVSS v3.1 base score is 9.6, indicating a critical severity level. The vector string (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that the attack vector requires local access (AV:A), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is changed (S:C), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and severity suggest that exploitation could lead to full system compromise, data theft, and disruption of services. The vulnerability affects both Tableau Server and Tableau Desktop, which are widely used data visualization and business intelligence tools, often deployed in enterprise environments for critical data analysis and reporting. The flaw's presence in the file upload functionality is particularly concerning because file upload features are common attack vectors for code injection and execution. This vulnerability underscores the importance of validating and securely handling file inputs and ensuring type safety in software components dealing with resource access.

Potential Impact

For European organizations, the impact of CVE-2025-26496 could be severe. Tableau products are widely adopted across various sectors including finance, healthcare, government, and manufacturing, all of which handle sensitive and regulated data. Exploitation of this vulnerability could lead to unauthorized access to confidential business intelligence data, manipulation or corruption of reports, and potential disruption of critical decision-making processes. The high impact on confidentiality, integrity, and availability means that attackers could exfiltrate sensitive data, alter analytics results, or cause denial of service conditions. Given the critical nature of the vulnerability and the lack of required privileges or user interaction, attackers with local access—such as malicious insiders or attackers who have gained initial footholds—could escalate their control significantly. This poses a substantial risk to compliance with European data protection regulations like GDPR, as breaches involving personal or sensitive data could lead to regulatory penalties and reputational damage. Additionally, organizations relying on Tableau for operational dashboards could experience business interruptions, affecting productivity and service delivery.

Mitigation Recommendations

European organizations should prioritize patching affected Tableau Server and Tableau Desktop installations by upgrading to versions 2025.1.3, 2024.2.12, 2023.3.19 or later as soon as patches become available. Until patches are applied, organizations should implement strict access controls to limit local access to Tableau servers and desktops only to trusted personnel. Employing endpoint protection solutions that monitor for suspicious file upload activities or unauthorized code execution can help detect exploitation attempts. Network segmentation should be used to isolate Tableau servers from less trusted network zones and reduce the attack surface. Additionally, organizations should audit and harden file upload configurations, ensuring that only necessary file types are accepted and that uploaded files are scanned for malware. Monitoring logs for unusual file upload or execution behavior is critical for early detection. Implementing application whitelisting and restricting execution permissions in directories used by Tableau for file uploads can further reduce risk. Finally, conducting regular security assessments and penetration testing focused on file upload functionalities will help identify residual weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-02-11T17:18:13.649Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8d3f1ad5a09ad002249d3

Added to database: 8/22/2025, 8:32:49 PM

Last enriched: 8/22/2025, 8:48:58 PM

Last updated: 8/23/2025, 4:00:13 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats