Skip to main content

CVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server

Unknown
VulnerabilityCVE-2025-26497cvecve-2025-26497cwe-434
Published: Fri Aug 22 2025 (08/22/2025, 20:13:13 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Editor modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 08/22/2025, 20:48:40 UTC

Technical Analysis

CVE-2025-26497 is a vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This specific vulnerability affects Salesforce's Tableau Server, particularly the Flow Editor modules running on Windows and Linux platforms. The flaw allows an attacker to perform an Absolute Path Traversal attack by uploading files without proper validation or restriction on file types. This means that an attacker could upload malicious files to arbitrary locations on the server's filesystem, potentially overwriting critical files or placing executable code where it can be run by the system or other users. The affected versions include all Tableau Server releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The vulnerability was publicly disclosed on August 22, 2025, but as of now, there are no known exploits in the wild. The absence of a CVSS score suggests that the severity has not been formally assessed yet, but the nature of the vulnerability indicates a significant risk. The unrestricted file upload combined with absolute path traversal can lead to remote code execution, privilege escalation, or denial of service, depending on the attacker's intent and the server's configuration. Since Tableau Server is widely used for business intelligence and data visualization, exploitation could compromise sensitive business data and disrupt critical analytics operations.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial. Tableau Server is commonly deployed in enterprises for data analytics, reporting, and decision-making processes. Exploitation could lead to unauthorized access to sensitive business intelligence data, manipulation or deletion of critical reports, and potential disruption of business operations. Given the absolute path traversal aspect, attackers might gain the ability to execute arbitrary code or implant persistent backdoors, leading to long-term compromise. This could also result in breaches of personal data protected under GDPR, exposing organizations to regulatory penalties and reputational damage. Additionally, since Tableau Server often integrates with other enterprise systems, a successful attack could serve as a pivot point for lateral movement within an organization's network. The lack of known exploits currently provides a window for proactive mitigation, but the risk remains high due to the critical nature of the vulnerability.

Mitigation Recommendations

Organizations should prioritize upgrading Tableau Server to versions 2025.1.3, 2024.2.12, or 2023.3.19 or later, where this vulnerability is addressed. In the absence of immediate patching, administrators should implement strict file upload controls, such as validating file types against a whitelist, enforcing file size limits, and scanning uploaded files for malware. Network segmentation should be employed to isolate Tableau Server from sensitive backend systems to limit potential lateral movement. Monitoring and logging of file upload activities should be enhanced to detect suspicious behavior early. Additionally, applying the principle of least privilege to the Tableau Server service account can reduce the impact of a successful exploit. Organizations should also review and harden server configurations, disable unnecessary features, and ensure that backups are regularly performed and securely stored to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-02-11T17:18:13.649Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8d3f1ad5a09ad002249d7

Added to database: 8/22/2025, 8:32:49 PM

Last enriched: 8/22/2025, 8:48:40 PM

Last updated: 8/23/2025, 12:35:18 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats