CVE-2025-67750: CWE-94: Improper Control of Generation of Code ('Code Injection') in Flow-Scanner lightning-flow-scanner
CVE-2025-67750 is a high-severity code injection vulnerability in lightning-flow-scanner versions prior to 6. 10. 6. It arises from improper control of code generation (CWE-94) where maliciously crafted Salesforce flow metadata files can trigger arbitrary JavaScript execution during scanning. The vulnerability exploits the APIVersion rule's use of new Function() to evaluate expression strings, allowing attackers to inject malicious code. This can compromise developer machines, CI/CD runners, and editor environments using the vulnerable tool. No authentication or user interaction is required to trigger the flaw, and it affects local environments where the scanner is run. Although no known exploits are reported in the wild, the impact on confidentiality, integrity, and availability is high. The issue is fixed in version 6. 10.
AI Analysis
Technical Summary
CVE-2025-67750 is a critical code injection vulnerability identified in the lightning-flow-scanner tool, which is used for analyzing and optimizing Salesforce Flows. The affected versions (6.10.5 and below) allow an attacker to craft malicious Salesforce flow metadata files that, when scanned, cause arbitrary JavaScript code execution on the host system. The root cause is the APIVersion rule's reliance on JavaScript's new Function() constructor to evaluate expression strings dynamically without proper sanitization or validation. This unsafe evaluation enables attackers to embed malicious expressions within the rule configuration or the flow metadata itself. When the scanner processes these inputs, the malicious code executes with the privileges of the user running the scanner, potentially compromising developer workstations, continuous integration (CI) runners, or integrated development environments (IDEs) such as VS Code. The vulnerability does not require authentication or user interaction beyond the scanning process, making it highly exploitable in environments where untrusted or external flow metadata files are analyzed. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed. Although no exploits have been observed in the wild, the risk is significant due to the potential for remote code execution and lateral movement within development pipelines. The vendor has addressed the issue in version 6.10.6 by presumably removing or securing the unsafe use of new Function(). Organizations using lightning-flow-scanner should upgrade immediately and review their scanning workflows to avoid processing untrusted metadata. Additional controls such as sandboxing scanning environments and monitoring for anomalous behavior during scans are advisable.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of development and CI/CD environments that utilize lightning-flow-scanner for Salesforce Flow analysis. Successful exploitation could lead to arbitrary code execution on developer machines or build servers, resulting in theft or manipulation of sensitive intellectual property, insertion of malicious code into production pipelines, or disruption of development workflows. Given the integration of Salesforce in many European enterprises for CRM and business process automation, compromised development tools could indirectly impact customer data confidentiality and business operations. The vulnerability could also facilitate lateral movement within internal networks, increasing the risk of broader compromise. Organizations with automated scanning in CI pipelines are particularly vulnerable, as malicious flow metadata could be introduced via third-party repositories or insider threats. The high CVSS score reflects the critical nature of the impact on confidentiality, integrity, and availability. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation and lack of required privileges underscore the urgency for patching and risk management.
Mitigation Recommendations
1. Immediately upgrade lightning-flow-scanner to version 6.10.6 or later to apply the official fix. 2. Implement strict validation and sanitization of all Salesforce flow metadata files before scanning, especially those sourced from external or untrusted repositories. 3. Isolate scanning environments by running the scanner within sandboxed or containerized environments with minimal privileges to limit potential damage from code execution. 4. Integrate runtime monitoring and alerting for anomalous behavior during scanning processes, such as unexpected network connections or file system changes. 5. Review and restrict access to CI/CD runners and developer machines to trusted personnel only, and enforce the principle of least privilege. 6. Conduct regular security audits of development tools and dependencies to identify and remediate similar risks proactively. 7. Educate developers and DevOps teams about the risks of processing untrusted metadata and the importance of using updated tools. 8. Consider implementing code signing or integrity verification mechanisms for flow metadata files to prevent tampering. 9. Maintain an inventory of all instances of lightning-flow-scanner usage across the organization to ensure comprehensive patching and risk assessment.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Ireland
CVE-2025-67750: CWE-94: Improper Control of Generation of Code ('Code Injection') in Flow-Scanner lightning-flow-scanner
Description
CVE-2025-67750 is a high-severity code injection vulnerability in lightning-flow-scanner versions prior to 6. 10. 6. It arises from improper control of code generation (CWE-94) where maliciously crafted Salesforce flow metadata files can trigger arbitrary JavaScript execution during scanning. The vulnerability exploits the APIVersion rule's use of new Function() to evaluate expression strings, allowing attackers to inject malicious code. This can compromise developer machines, CI/CD runners, and editor environments using the vulnerable tool. No authentication or user interaction is required to trigger the flaw, and it affects local environments where the scanner is run. Although no known exploits are reported in the wild, the impact on confidentiality, integrity, and availability is high. The issue is fixed in version 6. 10.
AI-Powered Analysis
Technical Analysis
CVE-2025-67750 is a critical code injection vulnerability identified in the lightning-flow-scanner tool, which is used for analyzing and optimizing Salesforce Flows. The affected versions (6.10.5 and below) allow an attacker to craft malicious Salesforce flow metadata files that, when scanned, cause arbitrary JavaScript code execution on the host system. The root cause is the APIVersion rule's reliance on JavaScript's new Function() constructor to evaluate expression strings dynamically without proper sanitization or validation. This unsafe evaluation enables attackers to embed malicious expressions within the rule configuration or the flow metadata itself. When the scanner processes these inputs, the malicious code executes with the privileges of the user running the scanner, potentially compromising developer workstations, continuous integration (CI) runners, or integrated development environments (IDEs) such as VS Code. The vulnerability does not require authentication or user interaction beyond the scanning process, making it highly exploitable in environments where untrusted or external flow metadata files are analyzed. The CVSS v3.1 base score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction needed. Although no exploits have been observed in the wild, the risk is significant due to the potential for remote code execution and lateral movement within development pipelines. The vendor has addressed the issue in version 6.10.6 by presumably removing or securing the unsafe use of new Function(). Organizations using lightning-flow-scanner should upgrade immediately and review their scanning workflows to avoid processing untrusted metadata. Additional controls such as sandboxing scanning environments and monitoring for anomalous behavior during scans are advisable.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of development and CI/CD environments that utilize lightning-flow-scanner for Salesforce Flow analysis. Successful exploitation could lead to arbitrary code execution on developer machines or build servers, resulting in theft or manipulation of sensitive intellectual property, insertion of malicious code into production pipelines, or disruption of development workflows. Given the integration of Salesforce in many European enterprises for CRM and business process automation, compromised development tools could indirectly impact customer data confidentiality and business operations. The vulnerability could also facilitate lateral movement within internal networks, increasing the risk of broader compromise. Organizations with automated scanning in CI pipelines are particularly vulnerable, as malicious flow metadata could be introduced via third-party repositories or insider threats. The high CVSS score reflects the critical nature of the impact on confidentiality, integrity, and availability. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation and lack of required privileges underscore the urgency for patching and risk management.
Mitigation Recommendations
1. Immediately upgrade lightning-flow-scanner to version 6.10.6 or later to apply the official fix. 2. Implement strict validation and sanitization of all Salesforce flow metadata files before scanning, especially those sourced from external or untrusted repositories. 3. Isolate scanning environments by running the scanner within sandboxed or containerized environments with minimal privileges to limit potential damage from code execution. 4. Integrate runtime monitoring and alerting for anomalous behavior during scanning processes, such as unexpected network connections or file system changes. 5. Review and restrict access to CI/CD runners and developer machines to trusted personnel only, and enforce the principle of least privilege. 6. Conduct regular security audits of development tools and dependencies to identify and remediate similar risks proactively. 7. Educate developers and DevOps teams about the risks of processing untrusted metadata and the importance of using updated tools. 8. Consider implementing code signing or integrity verification mechanisms for flow metadata files to prevent tampering. 9. Maintain an inventory of all instances of lightning-flow-scanner usage across the organization to ensure comprehensive patching and risk assessment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-11T20:30:54.927Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693c7a77b31a4aba68228b0e
Added to database: 12/12/2025, 8:26:31 PM
Last enriched: 12/19/2025, 9:42:06 PM
Last updated: 2/7/2026, 12:51:15 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.