Researchers Identify 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Published:

spot_img

Security Vulnerabilities Found in Salesforce Industry Cloud

Cybersecurity researchers have revealed over 20 configuration-related vulnerabilities within Salesforce Industry Cloud, also known as Salesforce Industries. These risks potentially expose sensitive data to unauthorized access, both from internal users and outside entities.

A Closer Look at the Vulnerabilities

These misconfigurations affect various components within the platform, including FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions. Aaron Costello, the chief of SaaS Security Research at AppOmni, highlights a crucial point: while low-code platforms like Salesforce simplify application development, they may introduce security risks if not handled properly.

Risks of Misconfiguration

Unaddressed vulnerabilities could allow malicious actors to access encrypted information about both employees and customers. This includes session data that tracks user interactions with Salesforce Industry Cloud, as well as sensitive credentials linked to Salesforce and other business systems. Furthermore, exposed business logic may permit attackers to manipulate the system for nefarious purposes.

Salesforce’s Response

In response to these threats, Salesforce has made strides to mitigate the risks. The company acknowledged three vulnerabilities and has provided configuration guidance for an additional two. However, the remaining 16 vulnerabilities have been left for customers to rectify independently.

The following are some vulnerabilities cataloged with CVE identifiers:

  • CVE-2025-43697: If ‘Check Field Level Security’ is not enabled for ‘Extract’ and ‘Turbo Extract Data Mappers, the ‘View Encrypted Data’ permission check fails, revealing cleartext values to users.
  • CVE-2025-43698: The SOQL data source navigates around Field-Level Security when retrieving data from Salesforce objects.
  • CVE-2025-43699: FlexCard does not correctly enforce ‘Required Permissions’ for the OmniUlCard object.
  • CVE-2025-43700: FlexCard fails to uphold the ‘View Encrypted Data’ permission, providing plaintext values for encrypted data.
  • CVE-2025-43701: FlexCard enables Guest Users to access values for Custom Settings.

These vulnerabilities create significant risks, allowing attackers to bypass security measures and extract critical information.

New Security Settings

AppOmni has introduced a new security setting called "EnforceDMFLSAndDataEncryption" in response to particular vulnerabilities. This requires customers to enable the setting to ensure that only users with the "View Encrypted Data" permission can see plaintext values returned by the Data Mapper.

Regulatory Concerns

Organizations subject to compliance regulations such as HIPAA, GDPR, SOX, or PCI-DSS should address these vulnerabilities seriously. The potential gaps could expose companies to regulatory scrutiny and penalties. The responsibility of implementing secure configurations lies with the customers. A single overlooked setting might compromise thousands of records without vendor accountability.

Salesforce’s Stance

A spokesperson from Salesforce responded to these findings by stating that most issues arise due to customer configuration errors rather than inherent application vulnerabilities. The company claims all identified issues have been addressed and that patches are now available to users. They emphasize there is no evidence that the vulnerabilities have been exploited in customer environments.

Other Vulnerability Discoveries

Adding to the concerns, security researcher Tobia Righi, known as MasterSplinter, recently discovered a Salesforce Object Query Language (SOQL) injection vulnerability that could also be exploited to access sensitive user data. The zero-day vulnerability in question arises from a user-controlled parameter, "contentDocumentId," leading to unsafe embedding within an application.

The exploitation of this flaw could allow attackers to inject additional queries and obtain database contents. Utilizing a publicly available brute-force script, it’s possible to generate IDs of non-public ContentDocument objects, which could yield sensitive information regarding uploaded documents.

Salesforce has expressed gratitude for the responsible disclosure of such vulnerabilities, affirming that they will continue to engage with the security research community.

Final Observations

The ongoing scrutiny of Salesforce Industry Cloud highlights the importance of vigilant configuration and security practices in low-code platforms. As organizations become more reliant on such technologies, addressing these vulnerabilities proactively will be critical in safeguarding sensitive data.

spot_img

Related articles

Recent articles

NTT DATA Unveils AI-Driven Software-Defined Infrastructure Services for Cisco

Transforming Digital Landscapes: NTT DATA’s AI-Powered Infrastructure Revolution A Strategic Evolution for the Digital Era In the rapidly advancing world of technology, infrastructure is often the...

Dark Web Leak: Over 100,000 Gemini and Binance User Details Exposed

Dark Web Threats Targeting Gemini and Binance Users Recent Developments in Cybersecurity Risks In a troubling update for cryptocurrency users, reports have emerged that threat actors...

ACSC Issues Alert: New Scam Campaign Targeting Consumers

Beware of Recent Scam Impersonating the Australian Cyber Security Centre The Australian Cyber Security Centre (ACSC), part of the Australian Signals Directorate, has recently issued...

President El-Sisi and German Chancellor Discuss Key Issues

### President El-Sisi and Chancellor Merz Discuss Strengthening Bilateral Relations Recently, President Abdel Fattah El-Sisi of Egypt held a significant phone conversation with Germany's newly...