{"id":59839,"date":"2025-08-03T03:38:41","date_gmt":"2025-08-03T03:38:41","guid":{"rendered":""},"modified":"2025-09-07T11:01:34","modified_gmt":"2025-09-07T17:01:34","slug":"cve-2025-52446-authorization-bypass-vulnerability-in-salesforce-tableau-server","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-52446-authorization-bypass-vulnerability-in-salesforce-tableau-server\/","title":{"rendered":"<strong>CVE-2025-52446: Authorization Bypass Vulnerability in Salesforce Tableau Server<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2025-52446 is a critical vulnerability found in Salesforce Tableau Server on both Windows and Linux platforms. This security flaw is categorized as an &#8220;Authorization Bypass Through User-Controlled Key&#8221; vulnerability, which allows attackers to manipulate the interface and gain unauthorized data access to the production database cluster. This flaw can be exploited by cyber attackers to potentially compromise the system or leak <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-43233-critical-https-proxy-vulnerability-allowing-sensitive-data-access\/\"  data-wpil-monitor-id=\"69376\">sensitive data<\/a>, hence posing a significant threat to organizations leveraging the Tableau Server for their data visualization needs.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-52446<br \/>\nSeverity: High (8.0 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-31278-memory-corruption-vulnerability-with-potential-system-compromise\/\"  data-wpil-monitor-id=\"70420\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-296500197\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52452-critical-path-traversal-vulnerability-in-salesforce-tableau-server\/\"  data-wpil-monitor-id=\"68756\">Salesforce Tableau<\/a> Server on Windows | Before 2025.1.3<br \/>\n<a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52448-critical-authorization-bypass-vulnerability-in-salesforce-tableau-server\/\"  data-wpil-monitor-id=\"68811\">Salesforce Tableau<\/a> Server on Linux | Before 2024.2.12, Before 2023.3.19<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-50105-critical-vulnerability-in-oracle-universal-work-queue-allowing-unauthorized-data-access\/\"  data-wpil-monitor-id=\"68757\">works by taking advantage of the vulnerably<\/a> configured tab-doc API modules in the Tableau Server. An attacker can manipulate the user-controlled key to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46386-authorization-bypass-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"79881\">bypass the authorization<\/a> process, effectively gaining unlawful access to the production database cluster. From here, the attacker can manipulate or extract sensitive data, potentially <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7793-critical-vulnerability-in-tenda-fh451-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"68758\">leading to a system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-2014085641\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a hypothetical example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36845-server-side-request-forgery-ssrf-vulnerability-in-eveo-urve-web-manager\/\"  data-wpil-monitor-id=\"70671\">vulnerability might be exploited using a malicious HTTP request:<\/a><\/p>\n<pre><code class=\"\" data-line=\"\">POST \/tab-doc\/api\/modules HTTP\/1.1\nHost: vulnerable-tableau.example.com\nContent-Type: application\/json\n{&quot;user-controlled-key&quot;: &quot;malicious_payload&quot;}<\/code><\/pre>\n<p>In the above example, the attacker sends a POST <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52362-critical-server-side-request-forgery-vulnerability-in-phproxy\/\"  data-wpil-monitor-id=\"71127\">request to the vulnerable<\/a> endpoint with a malicious payload in the &#8220;user-controlled-key&#8221; parameter. If successful, the attacker would <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-57154-critical-access-control-bypass-vulnerability-in-dts-shop-v0-0-1-snapshot\/\"  data-wpil-monitor-id=\"76543\">bypass the authorization process and gain access<\/a> to the production database cluster.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate this vulnerability, users of the affected Tableau Server versions are advised to promptly apply the vendor-supplied patch. In cases where immediate patching is not possible, implementing a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can serve as a temporary mitigation measure to detect and block exploit attempts. Regular <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7096-critical-vulnerability-in-comodo-internet-security-premium-12-3-4-8162\/\"  data-wpil-monitor-id=\"66739\">security audits and vulnerability<\/a> assessments are also recommended to ensure the ongoing security of the system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2025-52446 is a critical vulnerability found in Salesforce Tableau Server on both Windows and Linux platforms. This security flaw is categorized as an &#8220;Authorization Bypass Through User-Controlled Key&#8221; vulnerability, which allows attackers to manipulate the interface and gain unauthorized data access to the production database cluster. This flaw can be exploited by cyber [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[88,82],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-59839","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-linux","vendor-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=59839"}],"version-history":[{"count":9,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59839\/revisions"}],"predecessor-version":[{"id":72317,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/59839\/revisions\/72317"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=59839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=59839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=59839"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=59839"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=59839"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=59839"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=59839"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=59839"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=59839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}