CVE-2025-26494
Published: 11 February 2025
Summary
CVE-2025-26494 is a high-severity SSRF (CWE-918) vulnerability in Tableau Tableau Server. Its CVSS base score is 7.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 16.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely identification, reporting, and patching of the SSRF flaw in Tableau Server versions 2023.3 through 2023.3.5 directly prevents authentication bypass exploitation as advised by Salesforce.
Validates information inputs such as URLs or parameters to the Tableau Server to block malicious SSRF requests that enable authentication bypass.
Enforces approved information flow control policies to restrict unauthorized server-side requests to internal authentication endpoints via SSRF.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SSRF vulnerability in public-facing Tableau Server directly enables exploitation for authentication bypass.
NVD Description
Server-Side Request Forgery (SSRF) vulnerability in Salesforce Tableau Server allows Authentication Bypass.This issue affects Tableau Server: from 2023.3 through 2023.3.5.
Deeper analysisAI
CVE-2025-26494 is a Server-Side Request Forgery (SSRF) vulnerability, classified as CWE-918, in Salesforce Tableau Server that allows authentication bypass. It affects Tableau Server versions from 2023.3 through 2023.3.5. The vulnerability carries a CVSS v3.1 base score of 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) and was published on 2025-02-11T18:15:47.060.
An attacker requires low privileges (PR:L) to exploit this issue over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation changes scope (S:C) and results in high confidentiality impact (C:H) with no impact on integrity or availability, enabling authentication bypass via SSRF.
The Salesforce security advisory at https://help.salesforce.com/s/articleView?id=001534936&type=1 provides details on mitigation and patches.
Details
- CWE(s)