CVE-2025-52449: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-52449 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in Salesforce Tableau Server's Extensible Protocol Service modules on Windows and Linux. This vulnerability allows attackers to perform alternative execution due to deceptive filenames, leading to remote code execution (RCE). The core issue arises because Tableau Server fails to properly restrict or validate the types of files uploaded, allowing malicious actors to upload files that can be executed on the server. The vulnerability affects multiple versions of Tableau Server prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that patches have been released in these versions to address the issue. The CVSS v3.1 base score is 8.5, reflecting high severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the vulnerable component. The impact on confidentiality and integrity is high, while availability impact is none. This means attackers can gain unauthorized access to sensitive data and modify it, but cannot disrupt service availability. No known exploits have been reported in the wild yet, but the vulnerability's characteristics make it a significant risk, especially in environments where Tableau Server is exposed to untrusted users or networks. The vulnerability highlights the importance of secure file upload handling and validation in web applications and services.
Potential Impact
The potential impact of CVE-2025-52449 is substantial for organizations worldwide that utilize Salesforce Tableau Server for data visualization and business intelligence. Successful exploitation enables remote code execution, allowing attackers to run arbitrary code on the server, potentially leading to full system compromise. This can result in unauthorized access to sensitive business data, manipulation or theft of confidential information, and undermining data integrity. Since Tableau Server often integrates with critical business processes and data sources, compromise could disrupt decision-making and expose organizations to regulatory and compliance risks. The vulnerability does not directly affect availability, but the breach of confidentiality and integrity alone can cause severe reputational damage and financial losses. Additionally, attackers could use compromised Tableau Servers as pivot points to infiltrate broader enterprise networks. The requirement for user interaction slightly limits exploitation but does not eliminate risk, especially in environments with many users or automated upload processes. Organizations with internet-facing Tableau Server instances or those allowing uploads from external users are particularly vulnerable.
Mitigation Recommendations
To mitigate CVE-2025-52449, organizations should immediately upgrade affected Tableau Server installations to versions 2025.1.3, 2024.2.12, 2023.3.19, or later where the vulnerability is patched. Beyond patching, implement strict file upload validation controls to restrict allowed file types and enforce server-side checks on file extensions and MIME types. Employ content scanning and sandboxing for uploaded files to detect and block malicious payloads. Limit upload permissions to trusted users and restrict upload functionality where possible. Monitor server logs and network traffic for unusual file upload activity or execution attempts. Use network segmentation and firewall rules to limit Tableau Server exposure to untrusted networks. Educate users about the risks of uploading untrusted files and enforce policies to prevent social engineering exploitation. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious upload patterns. Regularly audit and review server configurations and access controls to minimize attack surface.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Switzerland, Singapore
CVE-2025-52449: CWE-434 Unrestricted Upload of File with Dangerous Type in Salesforce Tableau Server
Description
Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-52449 is a vulnerability classified under CWE-434, which involves the unrestricted upload of files with dangerous types in Salesforce Tableau Server's Extensible Protocol Service modules on Windows and Linux. This vulnerability allows attackers to perform alternative execution due to deceptive filenames, leading to remote code execution (RCE). The core issue arises because Tableau Server fails to properly restrict or validate the types of files uploaded, allowing malicious actors to upload files that can be executed on the server. The vulnerability affects multiple versions of Tableau Server prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that patches have been released in these versions to address the issue. The CVSS v3.1 base score is 8.5, reflecting high severity, with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is changed (S:C), indicating that exploitation affects resources beyond the vulnerable component. The impact on confidentiality and integrity is high, while availability impact is none. This means attackers can gain unauthorized access to sensitive data and modify it, but cannot disrupt service availability. No known exploits have been reported in the wild yet, but the vulnerability's characteristics make it a significant risk, especially in environments where Tableau Server is exposed to untrusted users or networks. The vulnerability highlights the importance of secure file upload handling and validation in web applications and services.
Potential Impact
The potential impact of CVE-2025-52449 is substantial for organizations worldwide that utilize Salesforce Tableau Server for data visualization and business intelligence. Successful exploitation enables remote code execution, allowing attackers to run arbitrary code on the server, potentially leading to full system compromise. This can result in unauthorized access to sensitive business data, manipulation or theft of confidential information, and undermining data integrity. Since Tableau Server often integrates with critical business processes and data sources, compromise could disrupt decision-making and expose organizations to regulatory and compliance risks. The vulnerability does not directly affect availability, but the breach of confidentiality and integrity alone can cause severe reputational damage and financial losses. Additionally, attackers could use compromised Tableau Servers as pivot points to infiltrate broader enterprise networks. The requirement for user interaction slightly limits exploitation but does not eliminate risk, especially in environments with many users or automated upload processes. Organizations with internet-facing Tableau Server instances or those allowing uploads from external users are particularly vulnerable.
Mitigation Recommendations
To mitigate CVE-2025-52449, organizations should immediately upgrade affected Tableau Server installations to versions 2025.1.3, 2024.2.12, 2023.3.19, or later where the vulnerability is patched. Beyond patching, implement strict file upload validation controls to restrict allowed file types and enforce server-side checks on file extensions and MIME types. Employ content scanning and sandboxing for uploaded files to detect and block malicious payloads. Limit upload permissions to trusted users and restrict upload functionality where possible. Monitor server logs and network traffic for unusual file upload activity or execution attempts. Use network segmentation and firewall rules to limit Tableau Server exposure to untrusted networks. Educate users about the risks of uploading untrusted files and enforce policies to prevent social engineering exploitation. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block suspicious upload patterns. Regularly audit and review server configurations and access controls to minimize attack surface.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-06-16T20:18:48.946Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6883d858ad5a09ad00565a90
Added to database: 7/25/2025, 7:17:44 PM
Last enriched: 2/27/2026, 3:13:31 AM
Last updated: 3/23/2026, 11:20:15 AM
Views: 166
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.