Researchers Identify 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Published:

spot_img

Security Vulnerabilities Found in Salesforce Industry Cloud

Cybersecurity researchers have revealed over 20 configuration-related vulnerabilities within Salesforce Industry Cloud, also known as Salesforce Industries. These risks potentially expose sensitive data to unauthorized access, both from internal users and outside entities.

A Closer Look at the Vulnerabilities

These misconfigurations affect various components within the platform, including FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions. Aaron Costello, the chief of SaaS Security Research at AppOmni, highlights a crucial point: while low-code platforms like Salesforce simplify application development, they may introduce security risks if not handled properly.

Risks of Misconfiguration

Unaddressed vulnerabilities could allow malicious actors to access encrypted information about both employees and customers. This includes session data that tracks user interactions with Salesforce Industry Cloud, as well as sensitive credentials linked to Salesforce and other business systems. Furthermore, exposed business logic may permit attackers to manipulate the system for nefarious purposes.

Salesforce’s Response

In response to these threats, Salesforce has made strides to mitigate the risks. The company acknowledged three vulnerabilities and has provided configuration guidance for an additional two. However, the remaining 16 vulnerabilities have been left for customers to rectify independently.

The following are some vulnerabilities cataloged with CVE identifiers:

  • CVE-2025-43697: If ‘Check Field Level Security’ is not enabled for ‘Extract’ and ‘Turbo Extract Data Mappers, the ‘View Encrypted Data’ permission check fails, revealing cleartext values to users.
  • CVE-2025-43698: The SOQL data source navigates around Field-Level Security when retrieving data from Salesforce objects.
  • CVE-2025-43699: FlexCard does not correctly enforce ‘Required Permissions’ for the OmniUlCard object.
  • CVE-2025-43700: FlexCard fails to uphold the ‘View Encrypted Data’ permission, providing plaintext values for encrypted data.
  • CVE-2025-43701: FlexCard enables Guest Users to access values for Custom Settings.

These vulnerabilities create significant risks, allowing attackers to bypass security measures and extract critical information.

New Security Settings

AppOmni has introduced a new security setting called "EnforceDMFLSAndDataEncryption" in response to particular vulnerabilities. This requires customers to enable the setting to ensure that only users with the "View Encrypted Data" permission can see plaintext values returned by the Data Mapper.

Regulatory Concerns

Organizations subject to compliance regulations such as HIPAA, GDPR, SOX, or PCI-DSS should address these vulnerabilities seriously. The potential gaps could expose companies to regulatory scrutiny and penalties. The responsibility of implementing secure configurations lies with the customers. A single overlooked setting might compromise thousands of records without vendor accountability.

Salesforce’s Stance

A spokesperson from Salesforce responded to these findings by stating that most issues arise due to customer configuration errors rather than inherent application vulnerabilities. The company claims all identified issues have been addressed and that patches are now available to users. They emphasize there is no evidence that the vulnerabilities have been exploited in customer environments.

Other Vulnerability Discoveries

Adding to the concerns, security researcher Tobia Righi, known as MasterSplinter, recently discovered a Salesforce Object Query Language (SOQL) injection vulnerability that could also be exploited to access sensitive user data. The zero-day vulnerability in question arises from a user-controlled parameter, "contentDocumentId," leading to unsafe embedding within an application.

The exploitation of this flaw could allow attackers to inject additional queries and obtain database contents. Utilizing a publicly available brute-force script, it’s possible to generate IDs of non-public ContentDocument objects, which could yield sensitive information regarding uploaded documents.

Salesforce has expressed gratitude for the responsible disclosure of such vulnerabilities, affirming that they will continue to engage with the security research community.

Final Observations

The ongoing scrutiny of Salesforce Industry Cloud highlights the importance of vigilant configuration and security practices in low-code platforms. As organizations become more reliant on such technologies, addressing these vulnerabilities proactively will be critical in safeguarding sensitive data.

spot_img

Related articles

Recent articles

Miahona Consortium Chosen as Preferred Bidder for $799 Million Arana ISTP Project

Miahona and Marafiq Selected for Major Makkah Sewage Treatment Project Key Partnership Announcement Power and Water Utility Company for Jubail and Yanbu (MARAFIQ) and Miahona Company...

Apple and Google Warn of New Global Cyber Threats

Apple and Google Warn Users of Global Cyber Threats Overview of Recent Threat Notifications In recent developments, tech leaders Apple and Google have issued urgent cyber-threat...

Walmart Shoppers Beware: Major Scam Hits Millions

A large-scale robocall scam is targeting millions of Walmart shoppers in the U.S. by impersonating the retailer’s customer service and inventing fake high-value purchases...

GCCA Celebrates Supreme Council’s Decision to Create GCC Civil Aviation Authority

GCC Civil Aviation Authority: A New Era for Gulf Air Travel A Significant Development for the Gulf Region The General Civil Aviation Authority (GCAA) of the...