CVE-2025-52452: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salesforce Tableau Server on Windows, Linux (tabdoc api - duplicate-data-source modules) allows Absolute Path Traversal. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-52452 is a path traversal vulnerability (CWE-22) identified in Salesforce Tableau Server, specifically affecting the tabdoc API's duplicate-data-source modules on both Windows and Linux platforms. This vulnerability allows an attacker to perform absolute path traversal by improperly limiting the pathname to restricted directories. Essentially, the application fails to adequately sanitize or validate user-supplied input that specifies file paths, enabling an attacker to access files and directories outside the intended restricted scope. This can lead to unauthorized access to sensitive files on the server's filesystem. The affected versions include all Tableau Server releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. However, path traversal vulnerabilities are generally considered serious because they can lead to information disclosure, potential privilege escalation, or further exploitation depending on the files accessed and the server configuration. Since Tableau Server is a widely used enterprise analytics platform, exploitation could expose sensitive business intelligence data or configuration files, potentially compromising confidentiality and integrity of organizational data.
Potential Impact
For European organizations using Salesforce Tableau Server, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Tableau Server often hosts critical business intelligence reports and data visualizations that may contain sensitive or proprietary information. Exploitation of this path traversal flaw could allow attackers to read arbitrary files on the server, including configuration files, credentials, or data extracts, which could lead to data breaches or lateral movement within the network. Given the GDPR and other stringent data protection regulations in Europe, unauthorized data disclosure could result in severe regulatory penalties and reputational damage. Additionally, if attackers gain access to configuration files or scripts, they might further compromise the server or pivot to other internal systems. The availability impact is generally limited unless the attacker uses the access to disrupt services or delete files, but the primary concern remains unauthorized data access.
Mitigation Recommendations
European organizations should prioritize updating Salesforce Tableau Server to the latest patched versions: 2025.1.3, 2024.2.12, or 2023.3.19 or later, as these versions address the vulnerability. Until patches are applied, organizations should implement strict network segmentation and access controls to limit exposure of Tableau Server to trusted users only. Employing Web Application Firewalls (WAFs) with custom rules to detect and block path traversal patterns in requests targeting the tabdoc API can provide temporary protection. Additionally, administrators should audit and restrict file system permissions for the Tableau Server process to minimize the impact of any unauthorized file access. Monitoring server logs for suspicious file access attempts and unusual API usage can help detect exploitation attempts early. Finally, organizations should review and harden their overall Tableau Server deployment, including disabling unnecessary modules or APIs that are not in use, to reduce the attack surface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-52452: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Salesforce Tableau Server
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Salesforce Tableau Server on Windows, Linux (tabdoc api - duplicate-data-source modules) allows Absolute Path Traversal. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-52452 is a path traversal vulnerability (CWE-22) identified in Salesforce Tableau Server, specifically affecting the tabdoc API's duplicate-data-source modules on both Windows and Linux platforms. This vulnerability allows an attacker to perform absolute path traversal by improperly limiting the pathname to restricted directories. Essentially, the application fails to adequately sanitize or validate user-supplied input that specifies file paths, enabling an attacker to access files and directories outside the intended restricted scope. This can lead to unauthorized access to sensitive files on the server's filesystem. The affected versions include all Tableau Server releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. However, path traversal vulnerabilities are generally considered serious because they can lead to information disclosure, potential privilege escalation, or further exploitation depending on the files accessed and the server configuration. Since Tableau Server is a widely used enterprise analytics platform, exploitation could expose sensitive business intelligence data or configuration files, potentially compromising confidentiality and integrity of organizational data.
Potential Impact
For European organizations using Salesforce Tableau Server, this vulnerability poses a significant risk to the confidentiality and integrity of their data. Tableau Server often hosts critical business intelligence reports and data visualizations that may contain sensitive or proprietary information. Exploitation of this path traversal flaw could allow attackers to read arbitrary files on the server, including configuration files, credentials, or data extracts, which could lead to data breaches or lateral movement within the network. Given the GDPR and other stringent data protection regulations in Europe, unauthorized data disclosure could result in severe regulatory penalties and reputational damage. Additionally, if attackers gain access to configuration files or scripts, they might further compromise the server or pivot to other internal systems. The availability impact is generally limited unless the attacker uses the access to disrupt services or delete files, but the primary concern remains unauthorized data access.
Mitigation Recommendations
European organizations should prioritize updating Salesforce Tableau Server to the latest patched versions: 2025.1.3, 2024.2.12, or 2023.3.19 or later, as these versions address the vulnerability. Until patches are applied, organizations should implement strict network segmentation and access controls to limit exposure of Tableau Server to trusted users only. Employing Web Application Firewalls (WAFs) with custom rules to detect and block path traversal patterns in requests targeting the tabdoc API can provide temporary protection. Additionally, administrators should audit and restrict file system permissions for the Tableau Server process to minimize the impact of any unauthorized file access. Monitoring server logs for suspicious file access attempts and unusual API usage can help detect exploitation attempts early. Finally, organizations should review and harden their overall Tableau Server deployment, including disabling unnecessary modules or APIs that are not in use, to reduce the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-06-16T20:18:48.946Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6883d858ad5a09ad00565a93
Added to database: 7/25/2025, 7:17:44 PM
Last enriched: 7/25/2025, 7:32:56 PM
Last updated: 9/6/2025, 1:37:32 PM
Views: 25
Related Threats
CVE-2025-10088: Cross Site Scripting in SourceCodester Time Tracker
MediumCVE-2025-41708: CWE-319 Cleartext Transmission of Sensitive Information in Bender CC612
HighCVE-2025-41682: CWE-522 Insufficiently Protected Credentials in Bender CC612
HighCVE-2025-41664: CWE-732 Incorrect Permission Assignment for Critical Resource in WAGO Coupler 0750-0362
HighCVE-2025-10087: SQL Injection in SourceCodester Pet Grooming Management Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.