Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server

0
High
VulnerabilityCVE-2025-26497cvecve-2025-26497cwe-434
Published: Fri Aug 22 2025 (08/22/2025, 20:13:13 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Editor modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 08/30/2025, 01:03:00 UTC

Technical Analysis

CVE-2025-26497 is a high-severity vulnerability affecting Salesforce Tableau Server on Windows and Linux platforms, specifically within the Flow Editor modules. The vulnerability is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This flaw allows an attacker to perform Absolute Path Traversal by uploading files without proper validation or restrictions on file types. Absolute Path Traversal vulnerabilities enable attackers to specify arbitrary file paths when uploading, potentially overwriting or placing malicious files in sensitive locations on the server's filesystem. This can lead to unauthorized file manipulation, execution of malicious code, or disruption of service. The affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The CVSS v3.1 base score is 7.3, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a significant risk. The lack of available patches at the time of reporting suggests that organizations must prioritize mitigation and monitoring until updates are released. Overall, this vulnerability poses a critical risk to the integrity and availability of Tableau Server environments by enabling attackers to upload and potentially execute malicious files, compromising sensitive data and operational continuity.

Potential Impact

For European organizations using Salesforce Tableau Server, this vulnerability can have severe consequences. Tableau Server is widely used for business intelligence and data visualization, often handling sensitive corporate and customer data. Exploitation could lead to unauthorized access to confidential information, data corruption, or service outages, disrupting business operations. Given the network-based attack vector and no requirement for authentication or user interaction, attackers can remotely exploit this vulnerability, increasing the risk of widespread compromise. This is particularly concerning for sectors with strict data protection regulations such as GDPR, where data breaches can result in significant legal and financial penalties. Additionally, compromised Tableau Servers could serve as pivot points for lateral movement within corporate networks, escalating the impact beyond the initial breach. The vulnerability's presence on both Windows and Linux platforms broadens the attack surface, affecting diverse IT environments common in European enterprises. The absence of known exploits currently provides a window for proactive defense, but also implies that attackers may develop exploits rapidly once the vulnerability is publicly known.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Immediate risk assessment to identify all Tableau Server instances and their versions to prioritize patching once updates are available. 2) Until patches are released, restrict file upload capabilities to trusted users only and implement strict file type validation and scanning at the application and network perimeter levels. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious file upload patterns and path traversal attempts targeting Tableau Server endpoints. 4) Monitor server logs and network traffic for anomalous upload activities or access to unusual file paths indicative of exploitation attempts. 5) Isolate Tableau Server environments within segmented network zones to limit lateral movement if compromise occurs. 6) Enforce the principle of least privilege on server file system permissions to minimize the impact of unauthorized file writes. 7) Conduct user awareness training emphasizing the risks of file uploads and suspicious activity reporting. 8) Prepare incident response plans specifically addressing potential exploitation of file upload vulnerabilities. These targeted measures complement standard security hygiene and help mitigate the risk until official patches are deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-02-11T17:18:13.649Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8d3f1ad5a09ad002249d7

Added to database: 8/22/2025, 8:32:49 PM

Last enriched: 8/30/2025, 1:03:00 AM

Last updated: 10/6/2025, 8:44:43 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats