tableau server security vulnerabilities

A significant security concern has emerged following the disclosure of eight serious vulnerabilities in Tableau Server, which were revealed and afterward patched in the June 26, 2025 release by Salesforce. The vulnerabilities affect multiple Tableau Server versions, including releases prior to 2025.1.3 and 2023.3.5, necessitating immediate action from affected organizations. The disclosed flaws were assigned CVSS scores ranging from 7.7 to 8.5, indicating their high levels of severity and potential for exploitation. Additionally, the severity level of 7.7 out of 10 highlights the urgent need for organizations to address these vulnerabilities promptly.

Among the vulnerabilities are those allowing unauthorized database access via arbitrary SQL, particularly CVE-2025-52446, CVE-2025-52447, and CVE-2025-52448. These flaws allow attackers to bypass authorization controls, leading to session-level manipulation and execution of unauthorized SQL statements on production databases. As a result, attackers potentially gain heightened privileges, posing a substantial risk of critical data exfiltration or tampering.

The most severe vulnerability, CVE-2025-52449, permits remote code execution through malicious file uploads, presenting a direct line for complete system compromise. This issue resides within the Tableau Extensible Protocol Service, which lacks the necessary validation for uploaded file integrity. Attackers may gain full control over the affected server instances, making it crucial for organizations to apply the recommended patches without delay.

The CVE-2025-52449 vulnerability exposes systems to remote code execution, allowing attackers to gain full control through malicious file uploads.

Additionally, CVE-2025-26494 comprises a server-side request forgery (SSRF) flaw, affecting versions 2023.3 to 2023.3.5. This vulnerability allows attackers to send crafted requests to internal servers, granting unauthorized access to privileged resources. The risk of lateral movement within the Tableau Server environment emphasizes the importance of immediate patching. Vulnerabilities include(the importance of updating to the latest release) both Windows and Linux Tableau Server installations, amplifying the threats if security configurations are not adequately hardened. As a result, organizations must adopt security hardening practices, including limiting user privileges and regulating access to sensitive configurations.

The consequence of exploitation could lead to production database compromise, system takeover, and significant data breaches, rendering timely intervention vital.

You May Also Like

China-Linked APT31 Accused of Brazen 2022 Hack on Czech Foreign Ministry

APT31’s audacious cyberattack on the Czech Foreign Ministry reveals alarming tactics that could jeopardize global security. What vulnerabilities are exposed? Find out more.

Japan and U.S. Join Forces to Battle Escalating Cyber Threats in a Fractured Digital World

Japan and the U.S. unite against relentless cyber threats—what groundbreaking strategies are they implementing to safeguard their digital frontiers? The future of regional security hangs in the balance.

Iran-Linked Hackers Target Trump Inner Circle in Aggressive Smear Plot, Experts Warn

Iran-linked hackers target Trump’s inner circle, threatening political stability with a calculated smear campaign. What does this mean for the 2024 election?

Iran May Hit U.S. Businesses Online—DHS Warns of Cyber Retaliation After Missile Strikes

Iran is retaliating with cyber threats against U.S. businesses. Are you prepared for the potential chaos that could ensue? Stay informed.