CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-26496 is a critical security vulnerability classified as CWE-843 (Access of Resource Using Incompatible Type, or type confusion) found in Salesforce's Tableau Server and Tableau Desktop products on Windows and Linux operating systems. The flaw exists within the file upload modules of these products, where improper handling of resource types leads to type confusion. This vulnerability enables an attacker with local access to perform Local Code Inclusion (LCI), allowing arbitrary code execution within the context of the affected application. The vulnerability affects all versions prior to 2025.1.3 for Tableau Server and prior to 2024.2.12 and 2023.3.19 for Tableau Desktop. The CVSS v3.1 base score is 9.3, indicating critical severity, with an attack vector of local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact on confidentiality, integrity, and availability is high, as successful exploitation could lead to full system compromise, data theft, or disruption of analytics services. Although no known exploits have been reported in the wild yet, the vulnerability's nature and critical score suggest that exploitation could be straightforward once local access is obtained. The issue was reserved in February 2025 and published in August 2025, with patches expected or already released in the specified fixed versions. The vulnerability underscores the risks associated with file upload handling and type safety in complex software systems like Tableau, widely used for business intelligence and data visualization.
Potential Impact
The potential impact of CVE-2025-26496 is severe for organizations using affected versions of Tableau Server and Tableau Desktop. Successful exploitation allows an attacker with local access to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized access to sensitive business intelligence data, manipulation or deletion of critical analytics reports, and disruption of data visualization services. Given Tableau's role in decision-making and data analysis, such a compromise could lead to significant operational downtime, loss of data integrity, and exposure of confidential corporate information. The vulnerability's ability to affect confidentiality, integrity, and availability simultaneously elevates the risk profile. Organizations with large deployments of Tableau, especially those handling sensitive or regulated data, face increased risk of data breaches and compliance violations. Additionally, the local access requirement means insider threats or attackers who have gained initial footholds on internal networks could leverage this vulnerability to escalate privileges and move laterally within enterprise environments.
Mitigation Recommendations
To mitigate CVE-2025-26496, organizations should immediately upgrade affected Tableau Server and Tableau Desktop installations to versions 2025.1.3, 2024.2.12, 2023.3.19, or later as provided by Salesforce. Until patches are applied, restrict local access to Tableau servers and desktops to trusted personnel only, employing strict access controls and monitoring. Implement robust endpoint security solutions to detect and prevent unauthorized local access or suspicious file upload activities. Employ application whitelisting and privilege restrictions to limit the ability of attackers to execute arbitrary code even if they gain local access. Conduct regular audits of user accounts and permissions on Tableau systems to minimize insider threat risks. Additionally, monitor logs for unusual file upload or execution behavior within Tableau environments. Organizations should also consider network segmentation to isolate Tableau servers from less trusted network zones, reducing the likelihood of attackers gaining local access. Finally, maintain an incident response plan that includes procedures for rapid patch deployment and forensic analysis in case of exploitation.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore
CVE-2025-26496: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Salesforce Tableau Server, Tableau Desktop
Description
Access of Resource Using Incompatible Type ('Type Confusion') vulnerability in Salesforce Tableau Server, Tableau Desktop on Windows, Linux (File Upload modules) allows Local Code Inclusion.This issue affects Tableau Server, Tableau Desktop: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-26496 is a critical security vulnerability classified as CWE-843 (Access of Resource Using Incompatible Type, or type confusion) found in Salesforce's Tableau Server and Tableau Desktop products on Windows and Linux operating systems. The flaw exists within the file upload modules of these products, where improper handling of resource types leads to type confusion. This vulnerability enables an attacker with local access to perform Local Code Inclusion (LCI), allowing arbitrary code execution within the context of the affected application. The vulnerability affects all versions prior to 2025.1.3 for Tableau Server and prior to 2024.2.12 and 2023.3.19 for Tableau Desktop. The CVSS v3.1 base score is 9.3, indicating critical severity, with an attack vector of local access (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact on confidentiality, integrity, and availability is high, as successful exploitation could lead to full system compromise, data theft, or disruption of analytics services. Although no known exploits have been reported in the wild yet, the vulnerability's nature and critical score suggest that exploitation could be straightforward once local access is obtained. The issue was reserved in February 2025 and published in August 2025, with patches expected or already released in the specified fixed versions. The vulnerability underscores the risks associated with file upload handling and type safety in complex software systems like Tableau, widely used for business intelligence and data visualization.
Potential Impact
The potential impact of CVE-2025-26496 is severe for organizations using affected versions of Tableau Server and Tableau Desktop. Successful exploitation allows an attacker with local access to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized access to sensitive business intelligence data, manipulation or deletion of critical analytics reports, and disruption of data visualization services. Given Tableau's role in decision-making and data analysis, such a compromise could lead to significant operational downtime, loss of data integrity, and exposure of confidential corporate information. The vulnerability's ability to affect confidentiality, integrity, and availability simultaneously elevates the risk profile. Organizations with large deployments of Tableau, especially those handling sensitive or regulated data, face increased risk of data breaches and compliance violations. Additionally, the local access requirement means insider threats or attackers who have gained initial footholds on internal networks could leverage this vulnerability to escalate privileges and move laterally within enterprise environments.
Mitigation Recommendations
To mitigate CVE-2025-26496, organizations should immediately upgrade affected Tableau Server and Tableau Desktop installations to versions 2025.1.3, 2024.2.12, 2023.3.19, or later as provided by Salesforce. Until patches are applied, restrict local access to Tableau servers and desktops to trusted personnel only, employing strict access controls and monitoring. Implement robust endpoint security solutions to detect and prevent unauthorized local access or suspicious file upload activities. Employ application whitelisting and privilege restrictions to limit the ability of attackers to execute arbitrary code even if they gain local access. Conduct regular audits of user accounts and permissions on Tableau systems to minimize insider threat risks. Additionally, monitor logs for unusual file upload or execution behavior within Tableau environments. Organizations should also consider network segmentation to isolate Tableau servers from less trusted network zones, reducing the likelihood of attackers gaining local access. Finally, maintain an incident response plan that includes procedures for rapid patch deployment and forensic analysis in case of exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-02-11T17:18:13.649Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a8d3f1ad5a09ad002249d3
Added to database: 8/22/2025, 8:32:49 PM
Last enriched: 2/27/2026, 1:20:25 AM
Last updated: 3/26/2026, 11:11:24 AM
Views: 616
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.