CVE-2025-52455: CWE-918 Server-Side Request Forgery (SSRF) in Salesforce Tableau Server
Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (EPS Server modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI Analysis
Technical Summary
CVE-2025-52455 is a Server-Side Request Forgery (SSRF) vulnerability identified in Salesforce Tableau Server, specifically affecting the EPS Server modules on both Windows and Linux platforms. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network access controls. In this case, the vulnerability allows resource location spoofing, which means an attacker could trick the Tableau Server into fetching resources from unintended or malicious locations. The affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The vulnerability is classified under CWE-918, which covers SSRF issues. No CVSS score has been assigned yet, and no known exploits are reported in the wild. The vulnerability was reserved in mid-June 2025 and published in late July 2025. The lack of a CVSS score suggests that the assessment is recent and still under evaluation. SSRF vulnerabilities can be leveraged to access internal services behind firewalls, perform port scanning, or exploit other vulnerabilities in internal systems, potentially leading to data exposure or further compromise. Given Tableau Server's role in data visualization and business intelligence, exploitation could lead to unauthorized access to sensitive business data or internal network reconnaissance.
Potential Impact
For European organizations, the impact of this SSRF vulnerability in Salesforce Tableau Server could be significant. Tableau Server is widely used across various industries in Europe for data analytics and visualization, often integrating with sensitive internal data sources. Exploitation could allow attackers to access internal network resources, bypass firewall protections, and potentially retrieve confidential business intelligence data or personally identifiable information (PII) protected under GDPR. This could lead to data breaches, regulatory fines, reputational damage, and operational disruption. Additionally, SSRF can be a stepping stone for lateral movement within an organization's network, increasing the risk of broader compromise. Organizations in sectors such as finance, healthcare, manufacturing, and government, which rely heavily on Tableau Server for decision-making, could face heightened risks. The absence of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
European organizations should prioritize updating Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as possible to remediate this SSRF vulnerability. Until patches are applied, organizations should implement strict network segmentation and firewall rules to limit Tableau Server's outbound HTTP requests to only trusted internal and external endpoints. Employing web application firewalls (WAFs) with SSRF detection capabilities can help detect and block malicious request patterns. Monitoring Tableau Server logs for unusual outbound requests or access patterns can provide early indicators of exploitation attempts. Additionally, organizations should review and minimize Tableau Server's permissions and network access to reduce the attack surface. Conducting internal penetration testing focusing on SSRF scenarios can help identify residual risks. Finally, ensure that incident response teams are aware of this vulnerability and prepared to respond to potential exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland, Italy, Spain
CVE-2025-52455: CWE-918 Server-Side Request Forgery (SSRF) in Salesforce Tableau Server
Description
Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server on Windows, Linux (EPS Server modules) allows Resource Location Spoofing. This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-52455 is a Server-Side Request Forgery (SSRF) vulnerability identified in Salesforce Tableau Server, specifically affecting the EPS Server modules on both Windows and Linux platforms. SSRF vulnerabilities occur when an attacker can manipulate a server to make HTTP requests to arbitrary domains or internal systems, potentially bypassing network access controls. In this case, the vulnerability allows resource location spoofing, which means an attacker could trick the Tableau Server into fetching resources from unintended or malicious locations. The affected versions include all releases prior to 2025.1.3, 2024.2.12, and 2023.3.19, indicating that multiple release branches are impacted. The vulnerability is classified under CWE-918, which covers SSRF issues. No CVSS score has been assigned yet, and no known exploits are reported in the wild. The vulnerability was reserved in mid-June 2025 and published in late July 2025. The lack of a CVSS score suggests that the assessment is recent and still under evaluation. SSRF vulnerabilities can be leveraged to access internal services behind firewalls, perform port scanning, or exploit other vulnerabilities in internal systems, potentially leading to data exposure or further compromise. Given Tableau Server's role in data visualization and business intelligence, exploitation could lead to unauthorized access to sensitive business data or internal network reconnaissance.
Potential Impact
For European organizations, the impact of this SSRF vulnerability in Salesforce Tableau Server could be significant. Tableau Server is widely used across various industries in Europe for data analytics and visualization, often integrating with sensitive internal data sources. Exploitation could allow attackers to access internal network resources, bypass firewall protections, and potentially retrieve confidential business intelligence data or personally identifiable information (PII) protected under GDPR. This could lead to data breaches, regulatory fines, reputational damage, and operational disruption. Additionally, SSRF can be a stepping stone for lateral movement within an organization's network, increasing the risk of broader compromise. Organizations in sectors such as finance, healthcare, manufacturing, and government, which rely heavily on Tableau Server for decision-making, could face heightened risks. The absence of known exploits currently provides a window for proactive mitigation, but the public disclosure increases the likelihood of future exploitation attempts.
Mitigation Recommendations
European organizations should prioritize updating Tableau Server to the fixed versions 2025.1.3, 2024.2.12, or 2023.3.19 as soon as possible to remediate this SSRF vulnerability. Until patches are applied, organizations should implement strict network segmentation and firewall rules to limit Tableau Server's outbound HTTP requests to only trusted internal and external endpoints. Employing web application firewalls (WAFs) with SSRF detection capabilities can help detect and block malicious request patterns. Monitoring Tableau Server logs for unusual outbound requests or access patterns can provide early indicators of exploitation attempts. Additionally, organizations should review and minimize Tableau Server's permissions and network access to reduce the attack surface. Conducting internal penetration testing focusing on SSRF scenarios can help identify residual risks. Finally, ensure that incident response teams are aware of this vulnerability and prepared to respond to potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Salesforce
- Date Reserved
- 2025-06-16T20:18:48.946Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6883d858ad5a09ad00565a8d
Added to database: 7/25/2025, 7:17:44 PM
Last enriched: 7/25/2025, 7:33:15 PM
Last updated: 9/7/2025, 8:31:04 AM
Views: 33
Related Threats
CVE-2025-48042: CWE-863 Incorrect Authorization in ash-project ash
HighCVE-2025-10068: SQL Injection in itsourcecode Online Discussion Forum
MediumCVE-2025-10067: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-10066: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-36100: CWE-260 Password in Configuration File in IBM MQ
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.