CVE-2025-9844

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to replace trusted executables in Salesforce CLI on Windows by exploiting an uncontrolled search path element. Attackers can place malicious files in directories searched before legitimate ones, potentially executing arbitrary code. This affects Windows users running Salesforce CLI versions before 2.106.6.

💻 Affected Systems

Products:
  • Salesforce CLI
Versions: All versions before 2.106.6
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations; Linux and macOS versions are not vulnerable. Requires attacker ability to place files in directories searched by the CLI.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with the privileges of the Salesforce CLI user, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or execution of malicious payloads when users run Salesforce CLI from untrusted directories or with insufficient path protections.

🟢

If Mitigated

Limited impact if proper access controls, path restrictions, and user awareness prevent execution from untrusted locations.

🌐 Internet-Facing: LOW - This is primarily a local attack vector requiring access to the target system's filesystem.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this, especially in shared or multi-user environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local filesystem access and knowledge of search path behavior. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.106.6 or later

Vendor Advisory: https://help.salesforce.com/s/articleView?id=005224301&type=1

Restart Required: No

Instructions:

1. Open command prompt as administrator. 2. Run: sfdx update 3. Verify version with: sfdx --version (should show 2.106.6 or higher)

🔧 Temporary Workarounds

Restrict PATH environment variable

windows

Remove untrusted directories from the system PATH to prevent searching malicious locations

Control Panel > System > Advanced system settings > Environment Variables > Edit PATH

Use absolute paths for CLI execution

windows

Always specify full paths when running Salesforce CLI commands

C:\Program Files\Salesforce CLI\bin\sfdx.exe [command]

🧯 If You Can't Patch

  • Restrict user permissions to prevent file creation in trusted directories
  • Implement application whitelisting to block unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Run 'sfdx --version' and check if version is below 2.106.6

Check Version:

sfdx --version

Verify Fix Applied:

Confirm version is 2.106.6 or higher with 'sfdx --version'

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from non-standard directories
  • Salesforce CLI processes spawning unexpected child processes

Network Indicators:

  • Unexpected outbound connections from Salesforce CLI processes

SIEM Query:

Process creation where parent process contains 'sfdx' and command line contains unusual paths

🔗 References

📤 Share & Export