Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop

0
Critical
VulnerabilityCVE-2025-26496cvecve-2025-26496cwe-843
Published: Fri Aug 22 2025 (08/22/2025, 20:10:41 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server, Tableau Desktop

Description

Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 08/30/2025, 01:02:39 UTC

Technical Analysis

CVE-2025-26496 is a critical vulnerability classified as CWE-843 (Access of Resource Using Incompatible Type, commonly known as 'Type Confusion') affecting Salesforce's Tableau Server and Tableau Desktop products on Windows and Linux platforms. The vulnerability resides in the File Upload modules of these applications and allows for Local Code Inclusion (LCI). Specifically, this type confusion flaw enables an attacker to manipulate the way resources are accessed or interpreted by the software, leading to the inclusion and execution of unauthorized local code. The affected versions include all releases prior to Tableau Server 2025.1.3, Tableau Desktop 2024.2.12, and Tableau Desktop 2023.3.19. The vulnerability has a CVSS v3.1 base score of 9.3, indicating a critical severity level. The vector string (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) reveals that exploitation requires local access (AV:L) but no privileges (PR:N) or user interaction (UI:N), and the impact spans confidentiality, integrity, and availability with a scope change (S:C). Although no known exploits are currently reported in the wild, the potential for severe damage is significant due to the ability to execute arbitrary code locally, which could be leveraged to escalate privileges or move laterally within an environment. Tableau Server and Desktop are widely used business intelligence and data visualization tools, often integrated into enterprise environments for sensitive data analysis and reporting. The File Upload module is a critical component that handles user-submitted content, making it a high-value target for attackers seeking to exploit this vulnerability.

Potential Impact

For European organizations, the impact of CVE-2025-26496 could be substantial. Tableau is commonly deployed in sectors such as finance, healthcare, manufacturing, and government agencies across Europe, where sensitive data confidentiality and integrity are paramount. Exploitation of this vulnerability could allow attackers with local access to execute arbitrary code, potentially leading to unauthorized data access, data manipulation, or disruption of analytics services. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), operational downtime, and reputational damage. Given the critical nature of the vulnerability and the broad impact on confidentiality, integrity, and availability, organizations using vulnerable Tableau versions face a heightened risk of targeted attacks, especially in environments where Tableau servers are accessible to multiple users or integrated with other critical systems.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately identify and inventory all Tableau Server and Tableau Desktop instances, including version numbers, to assess exposure. 2) Prioritize patching by upgrading to the fixed versions: Tableau Server 2025.1.3 or later, Tableau Desktop 2024.2.12 or later, and Tableau Desktop 2023.3.19 or later. 3) Restrict local access to Tableau servers and desktops by enforcing strict access controls, limiting user permissions, and employing network segmentation to reduce the attack surface. 4) Monitor file upload activities closely, implementing anomaly detection to identify suspicious uploads or access patterns. 5) Employ application whitelisting and endpoint protection solutions to detect and block unauthorized code execution. 6) Conduct regular security audits and penetration tests focusing on file upload functionalities. 7) Educate administrators and users about the risks associated with local access and the importance of applying security updates promptly. These steps go beyond generic advice by emphasizing access control, monitoring, and proactive detection tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-02-11T17:18:13.649Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8d3f1ad5a09ad002249d3

Added to database: 8/22/2025, 8:32:49 PM

Last enriched: 8/30/2025, 1:02:39 AM

Last updated: 10/7/2025, 1:01:19 PM

Views: 218

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats