{"id":79370,"date":"2025-09-30T06:59:06","date_gmt":"2025-09-30T06:59:06","guid":{"rendered":""},"modified":"2025-10-21T11:37:26","modified_gmt":"2025-10-21T17:37:26","slug":"cve-2025-9844-uncontrolled-search-path-element-vulnerability-in-salesforce-cli-on-windows","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-9844-uncontrolled-search-path-element-vulnerability-in-salesforce-cli-on-windows\/","title":{"rendered":"<strong>CVE-2025-9844: Uncontrolled Search Path Element Vulnerability in Salesforce CLI on Windows<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>This blog post will provide an in-depth look into the recent CVE-2025-9844 vulnerability. This particular vulnerability is a severe one, as identified by its CVSS severity score of 8.8, and affects the Salesforce CLI on Windows. The vulnerability lies within an uncontrolled search path element, which presents <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-26210-deepseek-xss-vulnerability-allows-potential-system-compromise\/\"  data-wpil-monitor-id=\"86683\">potential threats for system<\/a> compromise or data leakage if exploited. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36899-unchecked-privilege-escalation-vulnerability-due-to-debugging-code-in-production-build\/\"  data-wpil-monitor-id=\"87082\">vulnerability matters due<\/a> to the widespread use of Salesforce CLI among businesses of all sizes. Therefore, understanding the vulnerability, its impact, and mitigation steps is crucial for every organization using Salesforce CLI on Windows.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-9844<br \/>\nSeverity: High (8.8 CVSS Score)<br \/>\nAttack Vector: Local<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: Required<br \/>\nImpact: Potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49401-critical-deserialization-of-untrusted-data-vulnerability-in-expresstech-systems-quiz-and-survey-master\/\"  data-wpil-monitor-id=\"87176\">system compromise or data<\/a> leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-1271903760\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Salesforce CLI on Windows | versions before 2.106.6<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-55998-xss-vulnerability-in-smart-search-filter-shopify-app-1-0\/\"  data-wpil-monitor-id=\"87969\">vulnerability arises from an uncontrolled search<\/a> path element in Salesforce CLI on Windows. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48581-critical-security-flaw-allowing-local-privilege-escalation-in-mainline-installations\/\"  data-wpil-monitor-id=\"87126\">allows an attacker with local<\/a> access to replace trusted executables with malicious ones. When the system or user runs the executable, it could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48539-critical-out-of-bounds-read-in-acl-arbiter-cc-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"87362\">lead to unauthorized actions such as system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1750287048\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Consider the following example where an attacker replaces a trusted executable with a malicious one. Here, they name the malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-59352-critical-vulnerability-in-dragonfly-file-distribution-system-leading-to-potential-remote-code-execution-rce\/\"  data-wpil-monitor-id=\"90838\">executable similarly to a trusted file:<\/a><\/p>\n<pre><code class=\"\" data-line=\"\"># Attacker machine\n# Create malicious executable\necho &#039;echo &quot;You have been hacked!&quot;&#039; &gt; salesforcecli.exe\n# Transfer the malicious executable to the target machine\nscp salesforcecli.exe user@target:\/usr\/bin\/<\/code><\/pre>\n<p>In the above pseudocode, the attacker creates a malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-34195-remote-code-execution-vulnerability-in-vasion-print-virtual-appliance-host-and-application\/\"  data-wpil-monitor-id=\"90149\">executable `salesforcecli.exe` that prints<\/a> &#8220;You have been hacked!&#8221; when executed. They then transfer this executable to the target machine, replacing the trusted `salesforcecli.exe`. When a user or system process executes `salesforcecli.exe`, the malicious code runs instead.<br \/>\nPlease note that this is a simplified example. Actual exploits may be more complex and difficult to detect.<\/p>\n<p><strong>Steps to Mitigate<\/strong><\/p>\n<p>To protect your <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-10034-d-link-dir-825-buffer-overflow-vulnerability-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"87484\">systems from this vulnerability<\/a>, the best course of action is to apply the vendor patch. Salesforce has released a patch in version 2.106.6 of the Salesforce CLI on Windows. If applying the patch is not immediately possible, using a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can provide temporary mitigation. It&#8217;s crucial to regularly update and patch your <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-57151-cross-site-scripting-vulnerability-in-phpgurukul-complaint-management-system-2-0\/\"  data-wpil-monitor-id=\"87784\">systems to prevent such vulnerabilities<\/a> from being exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview This blog post will provide an in-depth look into the recent CVE-2025-9844 vulnerability. This particular vulnerability is a severe one, as identified by its CVSS severity score of 8.8, and affects the Salesforce CLI on Windows. The vulnerability lies within an uncontrolled search path element, which presents potential threats for system compromise or data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[82],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-79370","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/79370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=79370"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/79370\/revisions"}],"predecessor-version":[{"id":83783,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/79370\/revisions\/83783"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=79370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=79370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=79370"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=79370"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=79370"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=79370"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=79370"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=79370"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=79370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}