Skip to main content

CVE-2025-26498: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server

Unknown
VulnerabilityCVE-2025-26498cvecve-2025-26498cwe-434
Published: Fri Aug 22 2025 (08/22/2025, 20:16:04 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (establish-connection-no-undo modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 08/22/2025, 20:48:22 UTC

Technical Analysis

CVE-2025-26498 is a vulnerability identified in Salesforce's Tableau Server product affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19. The vulnerability is categorized under CWE-434, which pertains to the unrestricted upload of files with dangerous types. Specifically, this flaw allows an attacker to perform an Absolute Path Traversal attack via the 'establish-connection-no-undo' modules on both Windows and Linux deployments of Tableau Server. Absolute Path Traversal vulnerabilities occur when an application improperly sanitizes user-supplied file paths, enabling attackers to upload files to arbitrary locations on the server's filesystem. This can lead to overwriting critical files, placing malicious executables, or otherwise manipulating the server environment. Since Tableau Server is a widely used analytics and business intelligence platform, exploitation could allow attackers to upload malicious payloads, potentially leading to remote code execution, privilege escalation, or persistent backdoors. The vulnerability arises from insufficient validation of uploaded file types and paths, allowing dangerous file types to be uploaded without restriction. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. However, the technical details indicate that the vulnerability is serious due to the nature of path traversal and unrestricted file upload combined. The lack of patch links suggests that fixes may be forthcoming or are in progress but not yet publicly available. Organizations using affected versions of Tableau Server should consider this a critical security risk due to the potential for server compromise and data exposure.

Potential Impact

For European organizations, the impact of this vulnerability could be significant. Tableau Server is commonly used in sectors such as finance, healthcare, manufacturing, and government agencies across Europe for data visualization and decision-making. Exploitation could lead to unauthorized access to sensitive business intelligence data, disruption of analytics services, and potential lateral movement within corporate networks. Given the ability to upload files to arbitrary paths, attackers could implant malware or ransomware, leading to operational downtime and data breaches. This could also result in violations of the EU's GDPR regulations if personal data is exposed or compromised, leading to substantial fines and reputational damage. The cross-platform nature of the vulnerability (Windows and Linux) increases the attack surface, as many European enterprises deploy Tableau Server in diverse environments. Furthermore, the absence of authentication requirements or user interaction details is unclear, but if exploitation can occur without authentication, the risk is elevated. Even if authentication is required, insider threats or compromised credentials could facilitate exploitation. Overall, the vulnerability threatens confidentiality, integrity, and availability of critical analytics infrastructure in European organizations.

Mitigation Recommendations

European organizations should immediately audit their Tableau Server deployments to identify affected versions. Until patches are released, organizations should implement the following specific mitigations: 1) Restrict file upload permissions and disable any unnecessary upload functionalities within Tableau Server, especially in the 'establish-connection-no-undo' modules. 2) Employ network segmentation and strict access controls to limit Tableau Server exposure, ensuring it is not directly accessible from untrusted networks. 3) Monitor file system changes on Tableau Server hosts for unauthorized file uploads or modifications, using file integrity monitoring tools. 4) Implement strict input validation and filtering at the web application firewall (WAF) level to detect and block suspicious file upload attempts or path traversal patterns. 5) Enforce the principle of least privilege for Tableau Server service accounts to minimize the impact of any successful exploitation. 6) Prepare incident response plans specifically for potential exploitation scenarios involving Tableau Server. 7) Regularly check Salesforce and Tableau security advisories for official patches and apply them promptly once available. 8) Conduct user awareness training for administrators to recognize suspicious activities related to Tableau Server.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-02-11T17:18:13.649Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8d3f1ad5a09ad002249da

Added to database: 8/22/2025, 8:32:49 PM

Last enriched: 8/22/2025, 8:48:22 PM

Last updated: 8/23/2025, 2:32:30 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats