CVE-2025-52447
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-25

Last updated on: 2025-10-31

Assigner: Salesforce, Inc.

Description
Authorization Bypass Through User-Controlled Key vulnerability in Salesforce Tableau Server on Windows, Linux (set-initial-sql tabdoc command modules) allows Interface Manipulation (data access to the production database cluster). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-25
Last Modified
2025-10-31
Generated
2026-05-07
AI Q&A
2025-07-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
linux linux_kernel From 5.15.160 (inc) to 5.16 (inc)
tableau tableau_server to 2023.3.19 (exc)
tableau tableau_server From 2024.2 (inc) to 2024.2.12 (exc)
tableau tableau_server From 2025.1 (inc) to 2025.1.3 (exc)
microsoft windows *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server on Windows and Linux. It involves the set-initial-sql tabdoc command modules, allowing an attacker to manipulate the interface and gain unauthorized access to data in the production database cluster.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized access to sensitive production database data, potentially exposing confidential information and compromising data integrity. It poses a high confidentiality and integrity risk but does not affect availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart