CVE-2025-52448
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-10-31
Assigner: Salesforce, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| tableau | tableau_server | to 2023.3.19 (exc) |
| tableau | tableau_server | From 2024.2 (inc) to 2024.2.12 (exc) |
| tableau | tableau_server | From 2025.1 (inc) to 2025.1.3 (exc) |
| microsoft | windows | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Authorization Bypass Through User-Controlled Key in Salesforce Tableau Server on Windows and Linux platforms. It affects the validate-initial-sql API modules and allows an attacker to manipulate the interface to gain unauthorized data access to the production database cluster. It impacts versions of Tableau Server before 2025.1.3, 2024.2.12, and 2023.3.19.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to bypass authorization controls and access sensitive data in the production database cluster without proper permissions. This can lead to exposure of confidential information and potential data breaches.