CVE-2025-52446

8.0 HIGH

📋 TL;DR

An authorization bypass vulnerability in Salesforce Tableau Server allows attackers to manipulate interface parameters and gain unauthorized access to production database clusters. This affects Tableau Server installations on Windows and Linux systems running vulnerable versions. Attackers can potentially access sensitive data they shouldn't have permission to view.

💻 Affected Systems

Products:
  • Salesforce Tableau Server
Versions: Before 2025.1.3, before 2024.2.12, before 2023.3.19
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects tab-doc API modules specifically. All Tableau Server deployments with these vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of production database clusters, leading to data exfiltration, data manipulation, or service disruption affecting all Tableau Server data.

🟠

Likely Case

Unauthorized access to sensitive business intelligence data, dashboards, and reports that should be restricted, potentially exposing confidential information.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access controls, and monitoring are in place to detect unusual database access patterns.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires some level of access to Tableau Server interface. The CWE-639 indicates user-controlled key manipulation, suggesting attackers need to be able to interact with the interface but not necessarily have valid credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.1.3, 2024.2.12, or 2023.3.19 depending on your version track

Vendor Advisory: https://help.salesforce.com/s/articleView?id=005105043&type=1

Restart Required: Yes

Instructions:

1. Identify your current Tableau Server version. 2. Download appropriate patch from Salesforce portal. 3. Apply patch following Tableau Server upgrade procedures. 4. Restart Tableau Server services. 5. Verify successful upgrade.

🔧 Temporary Workarounds

Network segmentation and access controls

all

Restrict network access to Tableau Server interfaces and backend database clusters

API rate limiting and monitoring

all

Implement rate limiting on tab-doc API endpoints and monitor for unusual access patterns

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Tableau Server from production databases
  • Enable detailed logging and monitoring for all database access attempts through Tableau interfaces

🔍 How to Verify

Check if Vulnerable:

Check Tableau Server version via Tableau Server Management Console or command: 'tsm version' on Linux or check Windows services

Check Version:

tsm version (Linux) or check Tableau Server Management Console (Windows)

Verify Fix Applied:

Verify version is 2025.1.3 or higher, 2024.2.12 or higher, or 2023.3.19 or higher depending on track

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns from Tableau Server
  • Multiple failed authorization attempts followed by successful access
  • Access to database objects outside normal user permissions

Network Indicators:

  • Unusual traffic between Tableau Server and database clusters
  • Multiple rapid API calls to tab-doc endpoints

SIEM Query:

source="tableau_server" AND (event_type="database_access" OR api_endpoint="tab-doc") AND user_permission="elevated"

🔗 References

📤 Share & Export