Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22584: CWE-94 Improper Control of Generation of Code ('Code Injection') in Salesforce Uni2TS

0
Unknown
VulnerabilityCVE-2026-22584cvecve-2026-22584cwe-94
Published: Fri Jan 09 2026 (01/09/2026, 22:10:02 UTC)
Source: CVE Database V5
Vendor/Project: Salesforce
Product: Uni2TS

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Salesforce Uni2TS on MacOS, Windows, Linux allows Leverage Executable Code in Non-Executable Files.This issue affects Uni2TS: through 1.2.0.

AI-Powered Analysis

AILast updated: 01/09/2026, 22:39:48 UTC

Technical Analysis

CVE-2026-22584 is a vulnerability classified under CWE-94, indicating improper control of code generation leading to code injection. It affects Salesforce Uni2TS, a product used on MacOS, Windows, and Linux platforms, up to version 1.2.0. The vulnerability allows attackers to embed and execute malicious code within files that are normally considered non-executable. This occurs because Uni2TS fails to properly validate or sanitize input that is used to generate executable code dynamically. As a result, an attacker could craft specially designed files that, when processed by Uni2TS, execute arbitrary code with the privileges of the running process. The vulnerability does not require authentication or user interaction, increasing its risk profile. Although no exploits have been reported in the wild, the flaw's presence across multiple operating systems and the critical nature of Salesforce products make it a serious concern. No official patch links are currently available, indicating that organizations must monitor Salesforce advisories closely. The lack of a CVSS score necessitates an independent severity assessment based on the potential impact and exploitability.

Potential Impact

For European organizations, the impact of CVE-2026-22584 could be severe. Exploitation may lead to unauthorized code execution, resulting in data breaches, system compromise, or disruption of business-critical applications relying on Uni2TS. Given Salesforce's widespread use in Europe, especially in sectors like finance, healthcare, and government, attackers could leverage this vulnerability to gain persistent access or move laterally within networks. The cross-platform nature means that organizations using diverse operating systems are all at risk. Confidentiality, integrity, and availability of sensitive data and services could be compromised. Additionally, the lack of authentication or user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks if the vulnerability is weaponized. This could also lead to regulatory and compliance issues under GDPR if personal data is exposed or systems are disrupted.

Mitigation Recommendations

Organizations should immediately inventory their use of Salesforce Uni2TS and identify affected versions (up to 1.2.0). Until patches are released, restrict file inputs to Uni2TS to trusted sources only and implement strict file validation and sanitization controls. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous code execution behaviors. Monitor Uni2TS logs and system behavior for signs of exploitation attempts. Network segmentation should be enforced to limit the spread of any potential compromise. Engage with Salesforce support for updates and apply patches promptly once available. Additionally, conduct security awareness training for administrators and users about the risks of processing untrusted files. Consider deploying runtime application self-protection (RASP) or similar technologies to detect and block injection attempts in real time.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Salesforce
Date Reserved
2026-01-07T19:03:25.721Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6961805b45ea0302aa992bb8

Added to database: 1/9/2026, 10:25:31 PM

Last enriched: 1/9/2026, 10:39:48 PM

Last updated: 1/10/2026, 7:17:34 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats