CVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Editor modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-26497 is a high-severity vulnerability affecting Salesforce Tableau Server on Windows and Linux platforms, specifically within the Flow Editor modules. The vulnerability is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This flaw allows an attacker to perform Absolute Path Traversal by uploading files without proper validation or restrictions on file types. Absolute Path Traversal vulnerabilities enable attackers to specify arbitrary file paths when uploading, potentially overwriting or placing malicious files in sensitive locations on the server's filesystem. This can lead to unauthorized file manipulation, execution of malicious code, or disruption of service. The affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The CVSS v3.1 base score is 7.3, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a significant risk. The lack of available patches at the time of reporting suggests that organizations must prioritize mitigation and monitoring until updates are released. Overall, this vulnerability poses a critical risk to the integrity and availability of Tableau Server environments by enabling attackers to upload and potentially execute malicious files, compromising sensitive data and operational continuity.
Potential Impact
For European organizations using Salesforce Tableau Server, this vulnerability can have severe consequences. Tableau Server is widely used for business intelligence and data visualization, often handling sensitive corporate and customer data. Exploitation could lead to unauthorized access to confidential information, data corruption, or service outages, disrupting business operations. Given the network-based attack vector and no requirement for authentication or user interaction, attackers can remotely exploit this vulnerability, increasing the risk of widespread compromise. This is particularly concerning for sectors with strict data protection regulations such as GDPR, where data breaches can result in significant legal and financial penalties. Additionally, compromised Tableau Servers could serve as pivot points for lateral movement within corporate networks, escalating the impact beyond the initial breach. The vulnerability's presence on both Windows and Linux platforms broadens the attack surface, affecting diverse IT environments common in European enterprises. The absence of known exploits currently provides a window for proactive defense, but also implies that attackers may develop exploits rapidly once the vulnerability is publicly known.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediate risk assessment to identify all Tableau Server instances and their versions to prioritize patching once updates are available. 2) Until patches are released, restrict file upload capabilities to trusted users only and implement strict file type validation and scanning at the application and network perimeter levels. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious file upload patterns and path traversal attempts targeting Tableau Server endpoints. 4) Monitor server logs and network traffic for anomalous upload activities or access to unusual file paths indicative of exploitation attempts. 5) Isolate Tableau Server environments within segmented network zones to limit lateral movement if compromise occurs. 6) Enforce the principle of least privilege on server file system permissions to minimize the impact of unauthorized file writes. 7) Conduct user awareness training emphasizing the risks of file uploads and suspicious activity reporting. 8) Prepare incident response plans specifically addressing potential exploitation of file upload vulnerabilities. These targeted measures complement standard security hygiene and help mitigate the risk until official patches are deployed.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-26497: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Flow Editor modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-26497 is a high-severity vulnerability affecting Salesforce Tableau Server on Windows and Linux platforms, specifically within the Flow Editor modules. The vulnerability is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This flaw allows an attacker to perform Absolute Path Traversal by uploading files without proper validation or restrictions on file types. Absolute Path Traversal vulnerabilities enable attackers to specify arbitrary file paths when uploading, potentially overwriting or placing malicious files in sensitive locations on the server's filesystem. This can lead to unauthorized file manipulation, execution of malicious code, or disruption of service. The affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The CVSS v3.1 base score is 7.3, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). No known exploits are currently reported in the wild, but the vulnerability's nature and ease of exploitation make it a significant risk. The lack of available patches at the time of reporting suggests that organizations must prioritize mitigation and monitoring until updates are released. Overall, this vulnerability poses a critical risk to the integrity and availability of Tableau Server environments by enabling attackers to upload and potentially execute malicious files, compromising sensitive data and operational continuity.
Potential Impact
For European organizations using Salesforce Tableau Server, this vulnerability can have severe consequences. Tableau Server is widely used for business intelligence and data visualization, often handling sensitive corporate and customer data. Exploitation could lead to unauthorized access to confidential information, data corruption, or service outages, disrupting business operations. Given the network-based attack vector and no requirement for authentication or user interaction, attackers can remotely exploit this vulnerability, increasing the risk of widespread compromise. This is particularly concerning for sectors with strict data protection regulations such as GDPR, where data breaches can result in significant legal and financial penalties. Additionally, compromised Tableau Servers could serve as pivot points for lateral movement within corporate networks, escalating the impact beyond the initial breach. The vulnerability's presence on both Windows and Linux platforms broadens the attack surface, affecting diverse IT environments common in European enterprises. The absence of known exploits currently provides a window for proactive defense, but also implies that attackers may develop exploits rapidly once the vulnerability is publicly known.
Mitigation Recommendations
European organizations should implement the following specific mitigation strategies: 1) Immediate risk assessment to identify all Tableau Server instances and their versions to prioritize patching once updates are available. 2) Until patches are released, restrict file upload capabilities to trusted users only and implement strict file type validation and scanning at the application and network perimeter levels. 3) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious file upload patterns and path traversal attempts targeting Tableau Server endpoints. 4) Monitor server logs and network traffic for anomalous upload activities or access to unusual file paths indicative of exploitation attempts. 5) Isolate Tableau Server environments within segmented network zones to limit lateral movement if compromise occurs. 6) Enforce the principle of least privilege on server file system permissions to minimize the impact of unauthorized file writes. 7) Conduct user awareness training emphasizing the risks of file uploads and suspicious activity reporting. 8) Prepare incident response plans specifically addressing potential exploitation of file upload vulnerabilities. These targeted measures complement standard security hygiene and help mitigate the risk until official patches are deployed.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-02-11T17:18:13.649Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a8d3f1ad5a09ad002249d7
Added to database: 8/22/2025, 8:32:49 PM
Last enriched: 8/30/2025, 1:03:00 AM
Last updated: 10/6/2025, 8:44:43 PM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59452: CWE-340 Generation of Predictable Numbers or Identifiers in YoSmart YoLink API
MediumCVE-2025-59451: CWE-863 Incorrect Authorization in YoSmart YoLink application
LowCVE-2025-59450: CWE-312 Cleartext Storage of Sensitive Information in YoSmart YoLink Smart Hub
MediumCVE-2025-59449: CWE-863 Incorrect Authorization in YoSmart YoLink MQTT broker
MediumCVE-2025-59448: CWE-319 Cleartext Transmission of Sensitive Information in YoSmart YoLink ecosystem
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.