{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-52449","assignerOrgId":"c9b25dee-ae6d-4083-ba23-638c500cc364","state":"PUBLISHED","assignerShortName":"Salesforce","dateReserved":"2025-06-16T20:18:48.946Z","datePublished":"2025-07-25T18:56:25.554Z","dateUpdated":"2026-02-26T17:50:14.493Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Extensible Protocol Service"],"platforms":["Windows","Linux"],"product":"Tableau Server","vendor":"Salesforce","versions":[{"lessThan":"2025.1.3","status":"affected","version":"0","versionType":"semver"},{"lessThan":"2024.2.12","status":"affected","version":"0","versionType":"semver"},{"lessThan":"2023.3.19","status":"affected","version":"0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19."}],"value":"Unrestricted Upload of File with Dangerous Type vulnerability in Salesforce Tableau Server on Windows, Linux (Extensible Protocol Service modules) allows Alternative Execution Due to Deceptive Filenames (RCE). This issue affects Tableau Server: before 2025.1.3, before 2024.2.12, before 2023.3.19."}],"impacts":[{"capecId":"CAPEC-635","descriptions":[{"lang":"en","value":"CAPEC-635 Alternative Execution Due to Deceptive Filenames (RCE)"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-434","description":"CWE-434 Unrestricted Upload of File with Dangerous Type","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"c9b25dee-ae6d-4083-ba23-638c500cc364","shortName":"Salesforce","dateUpdated":"2025-07-25T19:01:34.584Z"},"references":[{"url":"https://help.salesforce.com/s/articleView?id=005105043&type=1"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"CHANGED","version":"3.1","baseScore":8.5,"attackVector":"ADJACENT_NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N","integrityImpact":"HIGH","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2025-52449","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-08-26T03:55:25.670668Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:50:14.493Z"}}]}}