Skip to main content

CVE-2025-52454: CWE-918 Server-Side Request Forgery (SSRF) in Salesforce Tableau Server

Medium
VulnerabilityCVE-2025-52454cvecve-2025-52454cwe-918
Published: Fri Jul 25 2025 (07/25/2025, 19:08:59 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Tableau Server

Description

Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (Amazon S3 Connector modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.

AI-Powered Analysis

AILast updated: 07/25/2025, 19:33:25 UTC

Technical Analysis

CVE-2025-52454 is a Server-Side Request Forgery (SSRF) vulnerability identified in Salesforce Tableau Server, specifically affecting the Amazon S3 Connector modules on Windows and Linux platforms. SSRF vulnerabilities occur when an attacker can manipulate a server to send crafted requests to unintended locations, potentially accessing internal resources or external systems that are otherwise inaccessible. In this case, the vulnerability allows Resource Location Spoofing, meaning an attacker could trick Tableau Server into making unauthorized requests to arbitrary locations. This could lead to unauthorized access to internal services, data exfiltration, or further network reconnaissance. The affected versions include all Tableau Server releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The vulnerability is categorized under CWE-918, which covers SSRF issues. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability was reserved in mid-June 2025 and published in late July 2025. The lack of a patch link suggests that fixes may be included in the referenced version updates but are not explicitly linked in the provided data. Given the nature of Tableau Server as a widely used enterprise analytics platform, exploitation could allow attackers to pivot into internal networks or access sensitive data repositories connected via the Amazon S3 Connector, which is commonly used for cloud storage integration.

Potential Impact

For European organizations, this SSRF vulnerability poses significant risks, especially for enterprises relying on Tableau Server for business intelligence and data analytics integrated with Amazon S3 cloud storage. Successful exploitation could lead to unauthorized internal network access, exposing sensitive corporate data, intellectual property, or personally identifiable information (PII) protected under GDPR. It could also facilitate lateral movement within corporate networks, increasing the risk of broader compromise. The impact on confidentiality is high due to potential data exposure; integrity could be affected if attackers manipulate data sources or analytics results; availability might be impacted if attackers use the vulnerability to launch denial-of-service attacks on internal services. Given the widespread adoption of Tableau Server in sectors such as finance, healthcare, manufacturing, and government across Europe, the threat could disrupt critical business operations and regulatory compliance. Additionally, the integration with Amazon S3 means cloud storage environments could be indirectly targeted, amplifying the risk of data breaches or leakage.

Mitigation Recommendations

European organizations should immediately verify their Tableau Server versions and prioritize upgrading to versions 2025.1.3, 2024.2.12, or 2023.3.19 or later, where the vulnerability is addressed. Until upgrades are applied, organizations should restrict network access to Tableau Server, especially limiting outbound requests from the server to only trusted destinations. Implement strict egress filtering and network segmentation to prevent unauthorized internal resource access via SSRF. Review and harden configurations of the Amazon S3 Connector modules, ensuring minimal permissions and access scopes are granted. Employ web application firewalls (WAFs) with SSRF detection capabilities to monitor and block suspicious request patterns. Conduct internal audits to detect any anomalous requests originating from Tableau Server. Additionally, organizations should monitor security advisories from Salesforce for official patches and guidance. Incorporating runtime application self-protection (RASP) tools may also help detect exploitation attempts in real time. Finally, ensure incident response plans include scenarios for SSRF exploitation to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-06-16T20:18:48.946Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6883d858ad5a09ad00565a8a

Added to database: 7/25/2025, 7:17:44 PM

Last enriched: 7/25/2025, 7:33:25 PM

Last updated: 7/26/2025, 9:55:08 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats