{"id":59818,"date":"2025-08-02T06:32:26","date_gmt":"2025-08-02T06:32:26","guid":{"rendered":""},"modified":"2025-11-01T05:38:05","modified_gmt":"2025-11-01T11:38:05","slug":"cve-2025-52449-unrestricted-file-upload-leads-to-remote-code-execution-in-salesforce-tableau-server","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-52449-unrestricted-file-upload-leads-to-remote-code-execution-in-salesforce-tableau-server\/","title":{"rendered":"<strong>CVE-2025-52449: Unrestricted File Upload Leads to Remote Code Execution in Salesforce Tableau Server<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2025-52449 is a serious vulnerability that affects Salesforce Tableau Server on both Windows and Linux platforms, specifically within the Extensible Protocol Service modules. This vulnerability allows for unrestricted upload of files with dangerous types, leading to alternative execution due to deceptive filenames. The risk associated with this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7460-critical-vulnerability-in-totolink-t6-leads-to-buffer-overflow\/\"  data-wpil-monitor-id=\"67211\">vulnerability is high as it can lead<\/a> to a potential system compromise or data leakage, a nightmare scenario for any organization relying on the integrity and confidentiality of its data.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-52449<br \/>\nSeverity: High (8.5 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: Compromise of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43192-critical-configuration-issue-in-macos-allowing-potential-system-compromise\/\"  data-wpil-monitor-id=\"71422\">system integrity and potential<\/a> data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-4117123790\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Tableau Server on Windows | before 2025.1.3<br \/>\nTableau Server on <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-6297-exploitation-of-dpkg-deb-extraction-vulnerability\/\"  data-wpil-monitor-id=\"91999\">Linux<\/a> | before 2025.1.3<br \/>\nTableau Server on all platforms | before 2024.2.12, before 2023.3.19<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit takes advantage of a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52809-php-remote-file-inclusion-vulnerability-in-national-weather-service-alerts\/\"  data-wpil-monitor-id=\"65939\">vulnerability in the Extensible Protocol Service<\/a> modules of Salesforce&#8217;s Tableau Server. By allowing unrestricted file uploads of dangerous types, an attacker can upload a malicious file with a deceptive filename, which could lead to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-26074-remote-code-execution-vulnerability-in-orkes-conductor-v3-21-11\/\"  data-wpil-monitor-id=\"65982\">remote code execution<\/a> (RCE) if the file is run.<br \/>\nThe deceptive filename could trick a user into thinking they are opening a benign file, when in fact they are <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50460-remote-code-execution-vulnerability-in-ms-swift-project\/\"  data-wpil-monitor-id=\"71421\">executing malicious code<\/a>. This could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7793-critical-vulnerability-in-tenda-fh451-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"71423\">lead to a compromise of the entire system<\/a>, potentially providing the attacker with full control over the affected server. Furthermore, the exploit could also <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-55731-sql-injection-vulnerability-in-frappe-framework-leading-to-potential-data-leakage\/\"  data-wpil-monitor-id=\"79276\">lead to data<\/a> leakage, potentially exposing sensitive information.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3402458649\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<pre><code class=\"\" data-line=\"\">POST \/extensible_protocol\/upload HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/octet-stream\nContent-Disposition: form-data; name=&quot;file&quot;; filename=&quot;benign_file.pdf.exe&quot;\n{ &quot;malicious_payload&quot;: &quot;...&quot; }<\/code><\/pre>\n<p>In this conceptual example, a malicious payload is being uploaded to the server under the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46835-high-risk-vulnerability-in-git-gui-allows-unauthorized-file-overwrite\/\"  data-wpil-monitor-id=\"66828\">guise of a benign PDF file<\/a>. However, the true file type is an executable, which could be run on the server once uploaded, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-54444-unrestricted-file-upload-leading-to-code-injection-in-samsung-electronics-magicinfo-9-server\/\"  data-wpil-monitor-id=\"67210\">leading to remote code<\/a> execution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2025-52449 is a serious vulnerability that affects Salesforce Tableau Server on both Windows and Linux platforms, specifically within the Extensible Protocol Service modules. This vulnerability allows for unrestricted upload of files with dangerous types, leading to alternative execution due to deceptive filenames. The risk associated with this vulnerability is high as it can lead [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[88,82],"product":[],"attack_vector":[80],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59818","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-linux","vendor-microsoft","attack_vector-rce"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59818"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59818\/revisions"}],"predecessor-version":[{"id":85204,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59818\/revisions\/85204"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59818"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59818"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59818"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59818"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59818"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59818"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}