Critical Tableau Server Flaws Allows Malicious File Uploads

Critical Tableau Server Flaws Allows Malicious File Uploads

Salesforce has addressed multiple critical security vulnerabilities in Tableau Server and Desktop that could enable attackers to upload malicious files and execute arbitrary code.

The vulnerabilities, disclosed on August 22, 2025, were proactively identified during a security assessment and patched in the July 22, 2025 maintenance release.

Critical Type Confusion Vulnerability

The most severe flaw, CVE-2025-26496, scores a critical 9.6 on the CVSS scale and affects the file upload modules in both Tableau Server and Desktop.

This access of resource using incompatible type vulnerability allows local code inclusion, potentially enabling attackers to execute malicious code within the application context. The flaw impacts Windows and Linux installations across multiple product versions.

CVE ID Vulnerability Type CVSS v3 Score Risk Level
CVE-2025-26496 Access of Resource Using Incompatible Type (‘Type Confusion’) 9.6 Critical
CVE-2025-26497 Unrestricted Upload of File with Dangerous Type 7.7 High
CVE-2025-26498 Unrestricted Upload of File with Dangerous Type 7.7 High
CVE-2025-52450 Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) 8.5 High
CVE-2025-52451 Improper Input Validation 8.5 High

Four additional vulnerabilities center around unrestricted file upload capabilities and path traversal weaknesses.

CVE-2025-26497 and CVE-2025-26498 both carry CVSS scores of 7.7 and allow absolute path traversal through dangerous file uploads in the Flow Editor and establish-connection-no-undo modules respectively.

Two more high-severity flaws, CVE-2025-52450 and CVE-2025-52451, affect the tabdoc API’s create-data-source-from-file-upload functionality.

Both vulnerabilities score 8.5 on CVSS and enable absolute path traversal through improper pathname limitation and input validation failures.

The vulnerabilities impact Tableau Server versions before 2025.1.4, 2024.2.13, and 2023.3.20. The type confusion flaw also affects corresponding Tableau Desktop versions.

All affected systems run on Windows and Linux platforms, with the vulnerabilities targeting specific modules responsible for file handling and data source creation.

These vulnerabilities create multiple attack vectors for malicious actors. The combination of unrestricted file uploads with path traversal capabilities could allow attackers to write files to arbitrary locations on the server filesystem.

The critical type confusion flaw escalates the threat by potentially enabling code execution, transforming file upload vulnerabilities into full system compromise opportunities.

The affected modules handle core Tableau functionality including data source creation, flow editing, and connection establishment, making these vulnerabilities particularly dangerous for organizations relying on Tableau for business intelligence operations.

Salesforce strongly advises all Tableau Server customers to upgrade immediately to the most recent supported version.

The fixes were included in maintenance releases published July 22, 2025, providing a one-month window between patch availability and public disclosure.

Organizations should prioritize patching systems exposed to untrusted users or networks. Given the file upload nature of these vulnerabilities, administrators should also review access controls around data source creation and file upload functionality while planning upgrade schedules.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.