Cyber Posture

CVE-2025-26494

High

Published: 11 February 2025

Published
11 February 2025
Modified
29 October 2025
KEV Added
Patch
CVSS Score 7.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0005 16.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26494 is a high-severity SSRF (CWE-918) vulnerability in Tableau Tableau Server. Its CVSS base score is 7.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely identification, reporting, and patching of the SSRF flaw in Tableau Server versions 2023.3 through 2023.3.5 directly prevents authentication bypass exploitation as advised by Salesforce.

prevent

Validates information inputs such as URLs or parameters to the Tableau Server to block malicious SSRF requests that enable authentication bypass.

prevent

Enforces approved information flow control policies to restrict unauthorized server-side requests to internal authentication endpoints via SSRF.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SSRF vulnerability in public-facing Tableau Server directly enables exploitation for authentication bypass.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server allows Authentication Bypass.This issue affects Tableau Server: from 2023.3 through 2023.3.5.

Deeper analysisAI

CVE-2025-26494 is a Server-Side Request Forgery (SSRF) vulnerability, classified as CWE-918, in Salesforce Tableau Server that allows authentication bypass. It affects Tableau Server versions from 2023.3 through 2023.3.5. The vulnerability carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) and was published on 2025-02-11T18:15:47.060.

An attacker requires low privileges (PR:L) to exploit this issue over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation changes scope (S:C) and results in high confidentiality impact (C:H) with no impact on integrity or availability, enabling authentication bypass via SSRF.

The Salesforce security advisory at https://help.salesforce.com/s/articleView?id=001534936&type=1 provides details on mitigation and patches.

Details

CWE(s)

Affected Products

tableau
tableau server
2023.3 — 2023.3.5

CVEs Like This One

CVE-2025-26495Same product: Tableau Tableau Server
CVE-2026-7025Shared CWE-918
CVE-2025-21385Shared CWE-918
CVE-2025-52362Shared CWE-918
CVE-2026-31317Shared CWE-918
CVE-2026-5016Shared CWE-918
CVE-2026-26338Shared CWE-918
CVE-2025-58045Shared CWE-918
CVE-2025-68030Shared CWE-918
CVE-2025-27651Shared CWE-918

References