CVE-2026-22583: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Salesforce Marketing Cloud Engagement
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.
AI Analysis
Technical Summary
This vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) is due to improper neutralization of argument delimiters in commands, enabling argument injection attacks that manipulate web services protocols. The flaw allows an unauthenticated attacker to execute commands that can compromise confidentiality, integrity, and availability of the service. It has a CVSS 3.1 base score of 9.8, indicating critical severity. The issue affects the cloud-hosted service before the patch date of January 21, 2026. Salesforce, as the cloud service provider, has made a patch available to address this vulnerability.
Potential Impact
Successful exploitation of this vulnerability can lead to complete compromise of confidentiality, integrity, and availability of the Salesforce Marketing Cloud Engagement service. This could allow attackers to manipulate web services protocols, potentially resulting in unauthorized data access, modification, or service disruption. No known active exploits have been reported at this time.
Mitigation Recommendations
Salesforce manages remediation for this cloud-hosted service and has released an official patch to fix the vulnerability. Users of Marketing Cloud Engagement should ensure their service is updated to the latest version released after January 21, 2026. Check Salesforce's official advisories for confirmation of patch deployment and further guidance.
CVE-2026-22583: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') in Salesforce Marketing Cloud Engagement
Description
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) is due to improper neutralization of argument delimiters in commands, enabling argument injection attacks that manipulate web services protocols. The flaw allows an unauthenticated attacker to execute commands that can compromise confidentiality, integrity, and availability of the service. It has a CVSS 3.1 base score of 9.8, indicating critical severity. The issue affects the cloud-hosted service before the patch date of January 21, 2026. Salesforce, as the cloud service provider, has made a patch available to address this vulnerability.
Potential Impact
Successful exploitation of this vulnerability can lead to complete compromise of confidentiality, integrity, and availability of the Salesforce Marketing Cloud Engagement service. This could allow attackers to manipulate web services protocols, potentially resulting in unauthorized data access, modification, or service disruption. No known active exploits have been reported at this time.
Mitigation Recommendations
Salesforce manages remediation for this cloud-hosted service and has released an official patch to fix the vulnerability. Users of Marketing Cloud Engagement should ensure their service is updated to the latest version released after January 21, 2026. Check Salesforce's official advisories for confirmation of patch deployment and further guidance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Salesforce
- Date Reserved
- 2026-01-07T19:03:25.720Z
- Cvss Version
- null
- State
- PUBLISHED
- Is Cloud Service
- true
Threat ID: 697417714623b1157c721592
Added to database: 1/24/2026, 12:50:57 AM
Last enriched: 4/30/2026, 1:56:20 AM
Last updated: 5/10/2026, 5:30:48 AM
Views: 106
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.