Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52450: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server

0
Medium
VulnerabilityCVE-2025-52450cvecve-2025-52450cwe-22
Published: Fri Aug 22 2025 (08/22/2025, 20:18:19 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salesforce Tableau Server on Windows, Linux (abdoc api - create-data-source-from-file-upload modules) allows Absolute Path Traversal.This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 08/30/2025, 00:51:01 UTC

Technical Analysis

CVE-2025-52450 is a path traversal vulnerability identified in Salesforce Tableau Server, specifically affecting the 'abdoc api' modules responsible for creating data sources from file uploads on Windows and Linux platforms. The vulnerability arises due to improper limitation of pathname inputs, classified under CWE-22, allowing an attacker with limited privileges (PR:L) to perform absolute path traversal attacks. This means an attacker can craft a malicious request to access files outside the intended restricted directories by manipulating file path parameters. The vulnerability affects multiple versions of Tableau Server prior to 2025.1.3, 2024.2.12, and 2023.3.19. The CVSS v3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), but no impact on integrity (I:N) or availability (A:N). Exploitation could lead to unauthorized disclosure of sensitive files on the server, potentially exposing configuration files, credentials, or other confidential data. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that organizations must monitor for updates and apply them promptly once available. The vulnerability is significant because Tableau Server is widely used for business intelligence and data visualization, often containing sensitive corporate data. The path traversal flaw could be leveraged by an authenticated attacker to escalate information disclosure risks without requiring user interaction, increasing the threat surface.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, especially for enterprises relying on Tableau Server for critical data analytics and reporting. Unauthorized access to sensitive files could lead to exposure of personal data, intellectual property, or internal configuration details, potentially violating GDPR and other data protection regulations. This could result in regulatory fines, reputational damage, and loss of customer trust. Additionally, the confidentiality breach could facilitate further attacks, such as lateral movement within the network or privilege escalation. Since the vulnerability requires some level of authentication, insider threats or compromised credentials pose a significant risk. The lack of impact on integrity and availability reduces the risk of data tampering or service disruption, but the confidentiality breach alone is critical for compliance-driven sectors such as finance, healthcare, and government entities prevalent in Europe.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict access controls on Tableau Server to minimize the number of users with privileges capable of exploiting this vulnerability. 2) Monitor and log all file upload and API activities related to the 'abdoc api' modules to detect anomalous path traversal attempts. 3) Apply strict input validation and sanitization on file path parameters, ensuring that only expected directory paths are accepted, and reject absolute or relative path traversal sequences (e.g., '../'). 4) Isolate Tableau Server instances in segmented network zones with limited access to sensitive backend file systems. 5) Enforce multi-factor authentication (MFA) to reduce the risk of credential compromise. 6) Stay vigilant for official Salesforce patches or updates addressing this vulnerability and deploy them promptly. 7) Conduct regular vulnerability scans and penetration tests focusing on path traversal and file upload functionalities. 8) Educate administrators and users about the risks of privilege misuse and suspicious activities related to file handling on Tableau Server.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-06-16T20:18:48.946Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a8d3f1ad5a09ad002249dd

Added to database: 8/22/2025, 8:32:49 PM

Last enriched: 8/30/2025, 12:51:01 AM

Last updated: 10/7/2025, 1:49:59 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats