CVE-2025-52447: CWE-639 Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server
Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (set-initial-sql tabdoc command modules) allows Interface Manipulation (data access to the production database cluster). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-52447 is an authorization bypass vulnerability identified in Salesforce Tableau Server, affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19 on Windows and Linux platforms. The vulnerability is categorized under CWE-639, which pertains to authorization bypass through user-controlled keys. Specifically, the issue arises in the 'set-initial-sql' tabdoc command modules, where insufficient validation of user-controlled input allows an attacker to manipulate interface commands. This manipulation can lead to unauthorized access to the production database cluster, potentially exposing sensitive data or enabling unauthorized data modifications. The vulnerability does not require known exploits in the wild yet, but its presence in a critical business intelligence platform like Tableau Server makes it a significant risk. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment. The core technical risk is that an attacker with access to Tableau Server’s interface can bypass authorization controls by exploiting the user-controlled key mechanism, thereby gaining unauthorized data access or control over production database operations.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Tableau Server is widely used across various sectors including finance, healthcare, manufacturing, and government agencies for data visualization and business intelligence. Unauthorized access to production databases could lead to exposure of sensitive personal data protected under GDPR, intellectual property theft, or manipulation of critical business data. This could result in regulatory penalties, loss of customer trust, and operational disruptions. Given the centralized nature of Tableau Server deployments, a successful exploitation could compromise large datasets and analytics infrastructure, affecting decision-making processes and potentially causing cascading effects on business operations. Additionally, organizations relying on Tableau Server for compliance reporting or operational monitoring may face integrity and availability issues, undermining their security posture and compliance obligations.
Mitigation Recommendations
Organizations should prioritize upgrading Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as they become available. Until patches are applied, it is critical to restrict access to Tableau Server interfaces to trusted users only, employing network segmentation and strict access controls. Implementing multi-factor authentication (MFA) for all users accessing Tableau Server can reduce the risk of unauthorized access. Monitoring and logging access to the 'set-initial-sql' commands and related modules should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten database permissions associated with Tableau Server to minimize the impact of any potential authorization bypass. Conducting regular security audits and penetration testing focused on authorization mechanisms within Tableau Server environments will help identify and remediate weaknesses proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-52447: CWE-639 Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server
Description
Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (set-initial-sql tabdoc command modules) allows Interface Manipulation (data access to the production database cluster). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-52447 is an authorization bypass vulnerability identified in Salesforce Tableau Server, affecting versions prior to 2025.1.3, 2024.2.12, and 2023.3.19 on Windows and Linux platforms. The vulnerability is categorized under CWE-639, which pertains to authorization bypass through user-controlled keys. Specifically, the issue arises in the 'set-initial-sql' tabdoc command modules, where insufficient validation of user-controlled input allows an attacker to manipulate interface commands. This manipulation can lead to unauthorized access to the production database cluster, potentially exposing sensitive data or enabling unauthorized data modifications. The vulnerability does not require known exploits in the wild yet, but its presence in a critical business intelligence platform like Tableau Server makes it a significant risk. The lack of a CVSS score indicates that the vulnerability is newly published and pending further assessment. The core technical risk is that an attacker with access to Tableau Server’s interface can bypass authorization controls by exploiting the user-controlled key mechanism, thereby gaining unauthorized data access or control over production database operations.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. Tableau Server is widely used across various sectors including finance, healthcare, manufacturing, and government agencies for data visualization and business intelligence. Unauthorized access to production databases could lead to exposure of sensitive personal data protected under GDPR, intellectual property theft, or manipulation of critical business data. This could result in regulatory penalties, loss of customer trust, and operational disruptions. Given the centralized nature of Tableau Server deployments, a successful exploitation could compromise large datasets and analytics infrastructure, affecting decision-making processes and potentially causing cascading effects on business operations. Additionally, organizations relying on Tableau Server for compliance reporting or operational monitoring may face integrity and availability issues, undermining their security posture and compliance obligations.
Mitigation Recommendations
Organizations should prioritize upgrading Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as they become available. Until patches are applied, it is critical to restrict access to Tableau Server interfaces to trusted users only, employing network segmentation and strict access controls. Implementing multi-factor authentication (MFA) for all users accessing Tableau Server can reduce the risk of unauthorized access. Monitoring and logging access to the 'set-initial-sql' commands and related modules should be enhanced to detect anomalous activities indicative of exploitation attempts. Additionally, organizations should review and tighten database permissions associated with Tableau Server to minimize the impact of any potential authorization bypass. Conducting regular security audits and penetration testing focused on authorization mechanisms within Tableau Server environments will help identify and remediate weaknesses proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-06-16T20:18:48.945Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6883d4d3ad5a09ad0056441c
Added to database: 7/25/2025, 7:02:43 PM
Last enriched: 7/25/2025, 7:17:55 PM
Last updated: 10/19/2025, 11:55:36 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.