Skip to main content

CVE-2025-9844: CWE-427 Uncontrolled Search Path Element in Salesforce Salesforce CLI

High
VulnerabilityCVE-2025-9844cvecve-2025-9844cwe-427
Published: Tue Sep 23 2025 (09/23/2025, 13:11:31 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Salesforce CLI

Description

Uncontrolled Search Path Element vulnerability in Salesforce Salesforce CLI on Windows allows Replace Trusted Executable.This issue affects Salesforce CLI: before 2.106.6.

AI-Powered Analysis

AILast updated: 09/23/2025, 13:21:04 UTC

Technical Analysis

CVE-2025-9844 is a vulnerability classified under CWE-427, which pertains to an Uncontrolled Search Path Element in the Salesforce Command Line Interface (CLI) on Windows platforms. This vulnerability allows an attacker to replace a trusted executable by manipulating the search path used by the Salesforce CLI before version 2.106.6. Essentially, the CLI improperly handles the directories it searches for executables, enabling an adversary to insert a malicious executable earlier in the search path. When the CLI attempts to run a trusted executable, it may instead execute the attacker's malicious code. This can lead to unauthorized code execution with the privileges of the user running the CLI. The vulnerability specifically affects Windows environments, where the order of directories in the PATH environment variable or other search path mechanisms can be exploited. No CVSS score has been assigned yet, and there are no known exploits in the wild at the time of publication. The vulnerability was reserved and published in September 2025, indicating it is a recent discovery. The lack of patch links suggests that a fix may not yet be publicly available or is pending release. Given that Salesforce CLI is widely used by developers and administrators to interact with Salesforce environments, exploitation could allow attackers to compromise development or deployment workflows, potentially leading to further compromise of Salesforce environments or local systems.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those heavily invested in Salesforce ecosystems. The Salesforce CLI is a critical tool for developers and administrators managing Salesforce applications and environments. If exploited, attackers could execute arbitrary code on developer or administrator machines, potentially leading to credential theft, unauthorized access to Salesforce environments, or the introduction of malicious configurations or code into production systems. This could disrupt business operations, lead to data breaches involving sensitive customer or business data, and damage organizational reputation. Additionally, since the vulnerability affects Windows systems, organizations with Windows-based development environments are particularly at risk. The potential for lateral movement within corporate networks exists if attackers leverage compromised developer machines to access other internal resources. The absence of known exploits in the wild currently reduces immediate risk, but the vulnerability's nature means it could be targeted once exploit code becomes available.

Mitigation Recommendations

European organizations should take proactive steps to mitigate this vulnerability: 1) Immediately audit and restrict the PATH environment variable and other search path configurations on Windows machines running Salesforce CLI to ensure no untrusted directories precede trusted ones. 2) Limit user privileges on developer and administrator machines to reduce the impact of potential code execution. 3) Monitor for unusual executable files or unexpected changes in directories commonly used by Salesforce CLI. 4) Implement application whitelisting to prevent execution of unauthorized binaries. 5) Encourage Salesforce CLI users to upgrade to version 2.106.6 or later once the patch is released. Until a patch is available, consider isolating Salesforce CLI usage to dedicated, hardened environments. 6) Educate users about the risks of running untrusted code and the importance of verifying the integrity of executables. 7) Employ endpoint detection and response (EDR) solutions to detect anomalous process execution related to Salesforce CLI activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Salesforce
Date Reserved
2025-09-02T13:07:18.226Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d29eae037b8c5ce43060c3

Added to database: 9/23/2025, 1:20:46 PM

Last enriched: 9/23/2025, 1:21:04 PM

Last updated: 9/25/2025, 7:49:37 AM

Views: 33

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats