CVE-2025-52449: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-52449 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in Salesforce Tableau Server. This vulnerability affects Tableau Server versions prior to 2025.1.3, 2024.2.12, and 2023.3.19, across Windows and Linux platforms, specifically impacting the Extensible Protocol Service modules. The core issue is that the server does not properly restrict or validate the types of files that users can upload, allowing an attacker to upload malicious files with deceptive filenames. This can lead to alternative execution paths, effectively enabling remote code execution (RCE) on the affected server. The vulnerability arises because the system fails to enforce adequate file type restrictions and sanitization, allowing attackers to bypass security controls and execute arbitrary code remotely. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of the vulnerability and the critical role Tableau Server plays in data visualization and business intelligence workflows. The lack of a CVSS score indicates that the vulnerability is newly published and has not yet been fully assessed or exploited. However, the technical details suggest a high-risk scenario due to the possibility of RCE without authentication or user interaction requirements explicitly stated. This vulnerability could be exploited by attackers to gain unauthorized access, execute malicious payloads, and potentially compromise the confidentiality, integrity, and availability of enterprise data and systems hosted on Tableau Server.
Potential Impact
For European organizations, the impact of CVE-2025-52449 could be severe. Tableau Server is widely used in enterprises for data analytics and visualization, often handling sensitive business intelligence data. Successful exploitation could lead to unauthorized access to critical data, disruption of analytics services, and potential lateral movement within corporate networks. This could result in data breaches, loss of intellectual property, and operational downtime. Given the increasing reliance on data-driven decision-making in European industries such as finance, manufacturing, and public sector, the compromise of Tableau Server could undermine business continuity and regulatory compliance, including GDPR obligations related to data protection. The ability to execute code remotely on servers that process and visualize sensitive data poses a direct threat to organizational security posture and could facilitate further attacks such as ransomware deployment or espionage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as they become available. In the interim, organizations should implement strict file upload controls, including whitelisting allowed file types and enforcing rigorous filename validation and sanitization. Network segmentation should be employed to isolate Tableau Server from critical infrastructure and sensitive data stores. Monitoring and logging of file upload activities should be enhanced to detect anomalous behavior indicative of exploitation attempts. Additionally, applying the principle of least privilege to Tableau Server service accounts and restricting administrative access can reduce the attack surface. Organizations should also conduct regular vulnerability assessments and penetration testing focused on file upload functionalities. Finally, maintaining up-to-date backups and an incident response plan tailored to potential RCE incidents will aid in rapid recovery if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-52449: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-52449 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in Salesforce Tableau Server. This vulnerability affects Tableau Server versions prior to 2025.1.3, 2024.2.12, and 2023.3.19, across Windows and Linux platforms, specifically impacting the Extensible Protocol Service modules. The core issue is that the server does not properly restrict or validate the types of files that users can upload, allowing an attacker to upload malicious files with deceptive filenames. This can lead to alternative execution paths, effectively enabling remote code execution (RCE) on the affected server. The vulnerability arises because the system fails to enforce adequate file type restrictions and sanitization, allowing attackers to bypass security controls and execute arbitrary code remotely. Although no known exploits are currently reported in the wild, the potential for exploitation is significant given the nature of the vulnerability and the critical role Tableau Server plays in data visualization and business intelligence workflows. The lack of a CVSS score indicates that the vulnerability is newly published and has not yet been fully assessed or exploited. However, the technical details suggest a high-risk scenario due to the possibility of RCE without authentication or user interaction requirements explicitly stated. This vulnerability could be exploited by attackers to gain unauthorized access, execute malicious payloads, and potentially compromise the confidentiality, integrity, and availability of enterprise data and systems hosted on Tableau Server.
Potential Impact
For European organizations, the impact of CVE-2025-52449 could be severe. Tableau Server is widely used in enterprises for data analytics and visualization, often handling sensitive business intelligence data. Successful exploitation could lead to unauthorized access to critical data, disruption of analytics services, and potential lateral movement within corporate networks. This could result in data breaches, loss of intellectual property, and operational downtime. Given the increasing reliance on data-driven decision-making in European industries such as finance, manufacturing, and public sector, the compromise of Tableau Server could undermine business continuity and regulatory compliance, including GDPR obligations related to data protection. The ability to execute code remotely on servers that process and visualize sensitive data poses a direct threat to organizational security posture and could facilitate further attacks such as ransomware deployment or espionage.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as they become available. In the interim, organizations should implement strict file upload controls, including whitelisting allowed file types and enforcing rigorous filename validation and sanitization. Network segmentation should be employed to isolate Tableau Server from critical infrastructure and sensitive data stores. Monitoring and logging of file upload activities should be enhanced to detect anomalous behavior indicative of exploitation attempts. Additionally, applying the principle of least privilege to Tableau Server service accounts and restricting administrative access can reduce the attack surface. Organizations should also conduct regular vulnerability assessments and penetration testing focused on file upload functionalities. Finally, maintaining up-to-date backups and an incident response plan tailored to potential RCE incidents will aid in rapid recovery if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-06-16T20:18:48.946Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6883d858ad5a09ad00565a90
Added to database: 7/25/2025, 7:17:44 PM
Last enriched: 7/25/2025, 7:33:06 PM
Last updated: 7/26/2025, 12:34:14 AM
Views: 2
Related Threats
CVE-2025-8178: Heap-based Buffer Overflow in Tenda AC10
HighCVE-2025-6895: CWE-288 Authentication Bypass Using an Alternate Path or Channel in melapress Melapress Login Security
CriticalCVE-2025-8177: Buffer Overflow in LibTIFF
MediumCVE-2025-8176: Use After Free in LibTIFF
MediumCVE-2025-8103: CWE-352 Cross-Site Request Forgery (CSRF) in etruel WPeMatico RSS Feed Fetcher
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.