Cyber Posture

CVE-2025-26494

High

Published: 11 February 2025

Published
11 February 2025
Modified
29 October 2025
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0005 16.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-26494 is a Server-Side Request Forgery (SSRF) vulnerability, classified as CWE-918, in Salesforce Tableau Server that allows authentication bypass. It affects Tableau Server versions from 2023.3 through 2023.3.5. The vulnerability carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) and was published on 2025-02-11T18:15:47.060.

An attacker requires low privileges (PR:L) to exploit this issue over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation changes scope (S:C) and results in high confidentiality impact (C:H) with no impact on integrity or availability, enabling authentication bypass via SSRF.

The Salesforce security advisory at https://help.salesforce.com/s/articleView?id=001534936&type=1 provides details on mitigation and patches.

Details

CWE(s)
CWE-918

Affected Products

tableau
tableau server
2023.3 — 2023.3.5

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF vulnerability in public-facing Tableau Server directly enables exploitation for authentication bypass.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References