Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52454: CWE-918 Server-Side Request Forgery (SSRF) in Salesforce Tableau Server

0
High
VulnerabilityCVE-2025-52454cvecve-2025-52454cwe-918
Published: Fri Jul 25 2025 (07/25/2025, 19:08:59 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Amazon S3 Connector modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:17:27 UTC

Technical Analysis

CVE-2025-52454 is a Server-Side Request Forgery (SSRF) vulnerability classified under CWE-918, impacting Salesforce Tableau Server on both Windows and Linux operating systems. The vulnerability resides in the Amazon S3 Connector modules, which are responsible for integrating Tableau Server with Amazon S3 storage services. SSRF vulnerabilities allow an attacker to induce the server to make HTTP requests to arbitrary domains or internal resources, potentially bypassing firewall restrictions and accessing sensitive internal systems. In this case, the vulnerability enables resource location spoofing, meaning an attacker can manipulate the server into fetching resources from unintended locations, which can lead to unauthorized data access or manipulation. The vulnerability affects multiple versions of Tableau Server prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating it spans several release branches. The CVSS v3.1 base score of 8.2 reflects a high severity, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), low privileges required (PR:L), no user interaction (UI:N), scope changed (S:C), and high impacts on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). This means an attacker with limited privileges and network access can exploit the vulnerability without user interaction, potentially compromising sensitive data and altering system behavior. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for organizations relying on Tableau Server for business intelligence and data analytics, especially those integrating with Amazon S3 storage. The lack of available patches at the time of reporting necessitates immediate attention to mitigation strategies.

Potential Impact

The SSRF vulnerability in Tableau Server can have severe consequences for organizations worldwide. Successful exploitation can lead to unauthorized access to internal network resources, including sensitive data repositories and administrative interfaces that are otherwise inaccessible externally. The high confidentiality impact means attackers could exfiltrate sensitive business intelligence data or customer information stored or processed by Tableau Server. The high integrity impact indicates potential manipulation of data or analytics results, undermining decision-making processes and trust in the platform. Since availability is not impacted, the server remains operational, which could allow prolonged undetected exploitation. Given Tableau Server's widespread use in enterprises for critical data visualization and analytics, this vulnerability could disrupt business operations, cause regulatory compliance issues, and damage organizational reputation. The requirement for low privileges and no user interaction lowers the barrier for exploitation, increasing the threat landscape. Additionally, attackers might leverage this SSRF to pivot into internal networks, escalating attacks beyond the initial compromise.

Mitigation Recommendations

Organizations should prioritize upgrading Tableau Server to versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as these patches become available from Salesforce. Until patches are applied, implement strict network segmentation and firewall rules to restrict Tableau Server's outbound HTTP requests, especially to internal IP ranges and sensitive endpoints. Employ web application firewalls (WAFs) with SSRF detection capabilities to monitor and block suspicious request patterns. Review and limit the permissions of accounts running Tableau Server services to the minimum necessary, reducing the impact of potential exploitation. Disable or restrict the use of the Amazon S3 Connector module if it is not essential, or configure it to whitelist only trusted resource locations. Conduct thorough logging and monitoring of Tableau Server network activity to detect anomalous outbound requests indicative of SSRF exploitation attempts. Additionally, perform internal security assessments and penetration testing focused on SSRF vectors to identify and remediate related weaknesses proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-06-16T20:18:48.946Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6883d858ad5a09ad00565a8a

Added to database: 7/25/2025, 7:17:44 PM

Last enriched: 3/24/2026, 12:17:27 AM

Last updated: 3/25/2026, 1:08:21 PM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses