Skip to main content

CVE-2025-52447: CWE-639 Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server

High
VulnerabilityCVE-2025-52447cvecve-2025-52447cwe-639
Published: Fri Jul 25 2025 (07/25/2025, 18:50:03 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (set-initial-sql tabdoc command modules) allows Interface Manipulation (data access to the production database cluster). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 07/25/2025, 19:17:55 UTC

Technical Analysis

CVE-2025-52447 is an authorization bypass vulnerability identified in Salesforce Tableau Server, affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19 on Windows and Linux platforms. The vulnerability is categorized under CWE-639, which pertains to authorization bypass through user-controlled keys. Specifically, the issue arises in the 'set-initial-sql' tabdoc command modules, where insufficient validation of user-controlled input allows an attacker to manipulate interface commands. This manipulation can lead to unauthorized access to the production database cluster, potentially exposing sensitive data or enabling unauthorized data modifications. The vulnerability does not require known exploits in the wild yet, but its presence in a critical business intelligence platform like Tableau Server makes it a significant risk. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment. The core technical risk is that an attacker with access to Tableau Server’s interface can bypass authorization controls by exploiting the user-controlled key mechanism, thereby gaining unauthorized data access or control over production database operations.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. Tableau Server is widely used across various sectors including finance, healthcare, manufacturing, and government agencies for data visualization and business intelligence. Unauthorized access to production databases could lead to exposure of sensitive personal data protected under GDPR, intellectual property theft, or manipulation of critical business data. This could result in regulatory penalties, loss of customer trust, and operational disruptions. Given the centralized nature of Tableau Server deployments, a successful exploitation could compromise large datasets and analytics infrastructure, affecting decision-making processes and potentially causing cascading effects on business operations. Additionally, organizations relying on Tableau Server for compliance reporting or operational monitoring may face integrity and availability issues, undermining their security posture and compliance obligations.

Mitigation Recommendations

Organizations should prioritize upgrading Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as they become available. Until patches are applied, it is critical to restrict access to Tableau Server interfaces to trusted users only, employing network segmentation and strict access controls. Implementing multi-factor authentication (MFA) for all users accessing Tableau Server can reduce the risk of unauthorized access. Monitoring and logging access to the 'set-initial-sql' commands and related modules should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten database permissions associated with Tableau Server to minimize the impact of any potential authorization bypass. Conducting regular security audits and penetration testing focused on authorization mechanisms within Tableau Server environments will help identify and remediate weaknesses proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-06-16T20:18:48.945Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6883d4d3ad5a09ad0056441c

Added to database: 7/25/2025, 7:02:43 PM

Last enriched: 7/25/2025, 7:17:55 PM

Last updated: 8/30/2025, 4:48:48 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats