CVE-2025-43698

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass field-level security controls in Salesforce OmniStudio FlexCards, potentially accessing sensitive data they shouldn't have permission to view. It affects all Salesforce customers using OmniStudio FlexCards before the Spring 2025 release. The high CVSS score of 9.1 indicates this is a critical security issue.

💻 Affected Systems

Products:
  • Salesforce OmniStudio FlexCards
Versions: All versions before Spring 2025 release
Operating Systems: Not OS-specific - Salesforce cloud platform
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Salesforce instances with OmniStudio FlexCards enabled. The vulnerability is in the OmniStudio component, not core Salesforce platform.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access highly sensitive data like financial records, personal identifiable information, or proprietary business data that should be protected by field-level security controls, leading to data breaches and regulatory violations.

🟠

Likely Case

Unauthorized users gain access to sensitive business data they shouldn't have permission to view, potentially exposing customer information, financial data, or internal business records.

🟢

If Mitigated

With proper monitoring and access controls, unauthorized access attempts could be detected and blocked, limiting data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the Salesforce instance but bypasses field-level security controls once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Spring 2025 release of Salesforce OmniStudio

Vendor Advisory: https://help.salesforce.com/s/articleView?id=004980323&type=1

Restart Required: No

Instructions:

1. Upgrade to Spring 2025 release of Salesforce OmniStudio. 2. Apply the update through Salesforce's standard release management process. 3. Verify field-level security controls are functioning correctly post-update.

🔧 Temporary Workarounds

Disable vulnerable FlexCards

all

Temporarily disable OmniStudio FlexCards that contain sensitive data until patching can be completed.

Review and restrict user permissions

all

Tighten user access controls and review all users with access to affected FlexCards.

🧯 If You Can't Patch

  • Implement additional monitoring on access to sensitive data fields
  • Apply compensating controls through Salesforce permission sets and sharing rules

🔍 How to Verify

Check if Vulnerable:

Check your Salesforce OmniStudio version - if it's before Spring 2025 release, you are vulnerable.

Check Version:

Check in Salesforce Setup under 'Installed Packages' or contact Salesforce support for version verification.

Verify Fix Applied:

Verify you're running Spring 2025 or later release of OmniStudio and test field-level security controls on FlexCards.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to sensitive data fields
  • Failed field-level security events followed by successful access

Network Indicators:

  • Not applicable - this is a cloud application vulnerability

SIEM Query:

Search for field access events where user permissions don't match data sensitivity level

🔗 References

📤 Share & Export