CVE-2026-22583
Published: 24 January 2026
Summary
CVE-2026-22583 is a critical-severity Argument Injection (CWE-88) vulnerability in Salesforce Marketing Cloud Engagement. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and correction of the argument injection flaw in the CloudPagesUrl module via patching to post-January 21st, 2026 releases.
Directly addresses the improper neutralization of argument delimiters by enforcing input validation mechanisms at entry points to block injection attacks.
Requires monitoring and implementing vendor security advisories, such as Salesforce's for this CVE, to apply the specific fix promptly.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Argument injection in public-facing CloudPagesUrl module directly enables remote unauthenticated command execution (T1190) and use of command interpreters (T1059).
NVD Description
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Salesforce Marketing Cloud Engagement (CloudPagesUrl module) allows Web Services Protocol Manipulation. This issue affects Marketing Cloud Engagement: before January 21st, 2026.
Deeper analysisAI
CVE-2026-22583 is an Improper Neutralization of Argument Delimiters in a Command vulnerability, classified as Argument Injection (CWE-88), affecting the CloudPagesUrl module in Salesforce Marketing Cloud Engagement. This flaw enables Web Services Protocol Manipulation and impacts Marketing Cloud Engagement versions prior to January 21st, 2026. Published on January 24, 2026, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for widespread remote exploitation.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and without requiring user interaction or privileges. Successful exploitation grants high-impact access to compromise confidentiality, integrity, and availability, potentially allowing arbitrary command execution or protocol manipulation within the affected module.
Salesforce mitigation details are available in their security advisory at https://help.salesforce.com/s/articleView?id=005299346&type=1, with the vulnerability resolved in Marketing Cloud Engagement releases on or after January 21st, 2026. Security practitioners should prioritize patching affected instances to versions post-January 21st, 2026.
Details
- CWE(s)