CVE-2025-52446: CWE-639 Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server
Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (tab-doc api modules) allows Interface Manipulation (data access to the production database cluster).This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-52446 is a critical authorization bypass vulnerability identified in Salesforce's Tableau Server, specifically affecting the tab-doc API modules on Windows and Linux platforms. The vulnerability is categorized under CWE-639, which pertains to authorization bypass through user-controlled keys. This flaw allows an attacker to manipulate interface elements to gain unauthorized access to the production database cluster, potentially exposing sensitive data or enabling unauthorized data operations. Affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple branches of Tableau Server are vulnerable. The vulnerability arises because the server improperly validates or restricts user-controlled keys, allowing malicious users to escalate privileges or bypass intended access controls. Although no known exploits are currently reported in the wild, the nature of the vulnerability suggests that exploitation could lead to significant data exposure or integrity violations within enterprise environments that rely on Tableau Server for business intelligence and data visualization. The absence of a CVSS score necessitates an assessment based on the potential impact and exploitability factors.
Potential Impact
For European organizations, the impact of this vulnerability could be severe, especially for those heavily reliant on Tableau Server for critical data analytics and reporting. Unauthorized access to production databases could lead to exposure of sensitive personal data, intellectual property, or financial information, potentially violating GDPR and other data protection regulations. This could result in regulatory fines, reputational damage, and operational disruptions. Additionally, compromised data integrity could mislead decision-making processes, affecting business outcomes. Given Tableau Server's role in aggregating and visualizing data from multiple sources, an attacker exploiting this vulnerability might pivot to other internal systems, escalating the breach's scope. The cross-platform nature (Windows and Linux) of the vulnerability increases the attack surface within diverse IT environments common in European enterprises.
Mitigation Recommendations
Organizations should prioritize updating Tableau Server to versions 2025.1.3, 2024.2.12, or 2023.3.19 or later, where this vulnerability is addressed. In the absence of immediate patching, administrators should implement strict access controls around Tableau Server, including network segmentation to limit access to the server and its database clusters. Monitoring and logging of API calls, especially those involving key-based access, should be enhanced to detect anomalous activities indicative of exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious interface manipulations can provide additional protection. Regular audits of user permissions and keys used within Tableau Server should be conducted to minimize the risk of misuse. Finally, organizations should prepare incident response plans tailored to data breaches involving business intelligence platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-52446: CWE-639 Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server
Description
Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (tab-doc api modules) allows Interface Manipulation (data access to the production database cluster).This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-52446 is a critical authorization bypass vulnerability identified in Salesforce's Tableau Server, specifically affecting the tab-doc API modules on Windows and Linux platforms. The vulnerability is categorized under CWE-639, which pertains to authorization bypass through user-controlled keys. This flaw allows an attacker to manipulate interface elements to gain unauthorized access to the production database cluster, potentially exposing sensitive data or enabling unauthorized data operations. Affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple branches of Tableau Server are vulnerable. The vulnerability arises because the server improperly validates or restricts user-controlled keys, allowing malicious users to escalate privileges or bypass intended access controls. Although no known exploits are currently reported in the wild, the nature of the vulnerability suggests that exploitation could lead to significant data exposure or integrity violations within enterprise environments that rely on Tableau Server for business intelligence and data visualization. The absence of a CVSS score necessitates an assessment based on the potential impact and exploitability factors.
Potential Impact
For European organizations, the impact of this vulnerability could be severe, especially for those heavily reliant on Tableau Server for critical data analytics and reporting. Unauthorized access to production databases could lead to exposure of sensitive personal data, intellectual property, or financial information, potentially violating GDPR and other data protection regulations. This could result in regulatory fines, reputational damage, and operational disruptions. Additionally, compromised data integrity could mislead decision-making processes, affecting business outcomes. Given Tableau Server's role in aggregating and visualizing data from multiple sources, an attacker exploiting this vulnerability might pivot to other internal systems, escalating the breach's scope. The cross-platform nature (Windows and Linux) of the vulnerability increases the attack surface within diverse IT environments common in European enterprises.
Mitigation Recommendations
Organizations should prioritize updating Tableau Server to versions 2025.1.3, 2024.2.12, or 2023.3.19 or later, where this vulnerability is addressed. In the absence of immediate patching, administrators should implement strict access controls around Tableau Server, including network segmentation to limit access to the server and its database clusters. Monitoring and logging of API calls, especially those involving key-based access, should be enhanced to detect anomalous activities indicative of exploitation attempts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious interface manipulations can provide additional protection. Regular audits of user permissions and keys used within Tableau Server should be conducted to minimize the risk of misuse. Finally, organizations should prepare incident response plans tailored to data breaches involving business intelligence platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-06-16T20:18:48.945Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6883d161ad5a09ad00561b43
Added to database: 7/25/2025, 6:48:01 PM
Last enriched: 7/25/2025, 7:02:53 PM
Last updated: 7/26/2025, 5:38:54 AM
Views: 3
Related Threats
CVE-2025-8097: CWE-20 Improper Input Validation in xTemos Woodmart
MediumCVE-2025-7501: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wonderplugin Wonder Slider
MediumCVE-2025-6987: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mdempfle Advanced iFrame
MediumCVE-2025-8180: Buffer Overflow in Tenda CH22
HighCVE-2025-8179: SQL Injection in PHPGurukul Local Services Search Engine Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.