Researchers Identify 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

Published:

spot_img

Security Vulnerabilities Found in Salesforce Industry Cloud

Cybersecurity researchers have revealed over 20 configuration-related vulnerabilities within Salesforce Industry Cloud, also known as Salesforce Industries. These risks potentially expose sensitive data to unauthorized access, both from internal users and outside entities.

A Closer Look at the Vulnerabilities

These misconfigurations affect various components within the platform, including FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions. Aaron Costello, the chief of SaaS Security Research at AppOmni, highlights a crucial point: while low-code platforms like Salesforce simplify application development, they may introduce security risks if not handled properly.

Risks of Misconfiguration

Unaddressed vulnerabilities could allow malicious actors to access encrypted information about both employees and customers. This includes session data that tracks user interactions with Salesforce Industry Cloud, as well as sensitive credentials linked to Salesforce and other business systems. Furthermore, exposed business logic may permit attackers to manipulate the system for nefarious purposes.

Salesforce’s Response

In response to these threats, Salesforce has made strides to mitigate the risks. The company acknowledged three vulnerabilities and has provided configuration guidance for an additional two. However, the remaining 16 vulnerabilities have been left for customers to rectify independently.

The following are some vulnerabilities cataloged with CVE identifiers:

  • CVE-2025-43697: If ‘Check Field Level Security’ is not enabled for ‘Extract’ and ‘Turbo Extract Data Mappers, the ‘View Encrypted Data’ permission check fails, revealing cleartext values to users.
  • CVE-2025-43698: The SOQL data source navigates around Field-Level Security when retrieving data from Salesforce objects.
  • CVE-2025-43699: FlexCard does not correctly enforce ‘Required Permissions’ for the OmniUlCard object.
  • CVE-2025-43700: FlexCard fails to uphold the ‘View Encrypted Data’ permission, providing plaintext values for encrypted data.
  • CVE-2025-43701: FlexCard enables Guest Users to access values for Custom Settings.

These vulnerabilities create significant risks, allowing attackers to bypass security measures and extract critical information.

New Security Settings

AppOmni has introduced a new security setting called "EnforceDMFLSAndDataEncryption" in response to particular vulnerabilities. This requires customers to enable the setting to ensure that only users with the "View Encrypted Data" permission can see plaintext values returned by the Data Mapper.

Regulatory Concerns

Organizations subject to compliance regulations such as HIPAA, GDPR, SOX, or PCI-DSS should address these vulnerabilities seriously. The potential gaps could expose companies to regulatory scrutiny and penalties. The responsibility of implementing secure configurations lies with the customers. A single overlooked setting might compromise thousands of records without vendor accountability.

Salesforce’s Stance

A spokesperson from Salesforce responded to these findings by stating that most issues arise due to customer configuration errors rather than inherent application vulnerabilities. The company claims all identified issues have been addressed and that patches are now available to users. They emphasize there is no evidence that the vulnerabilities have been exploited in customer environments.

Other Vulnerability Discoveries

Adding to the concerns, security researcher Tobia Righi, known as MasterSplinter, recently discovered a Salesforce Object Query Language (SOQL) injection vulnerability that could also be exploited to access sensitive user data. The zero-day vulnerability in question arises from a user-controlled parameter, "contentDocumentId," leading to unsafe embedding within an application.

The exploitation of this flaw could allow attackers to inject additional queries and obtain database contents. Utilizing a publicly available brute-force script, it’s possible to generate IDs of non-public ContentDocument objects, which could yield sensitive information regarding uploaded documents.

Salesforce has expressed gratitude for the responsible disclosure of such vulnerabilities, affirming that they will continue to engage with the security research community.

Final Observations

The ongoing scrutiny of Salesforce Industry Cloud highlights the importance of vigilant configuration and security practices in low-code platforms. As organizations become more reliant on such technologies, addressing these vulnerabilities proactively will be critical in safeguarding sensitive data.

spot_img

Related articles

Recent articles

Vertiv Names Mike Giresi as Global CIO to Strengthen AI Strategy

Vertiv Welcomes Mike Giresi as Global Chief Information Officer Vertiv, a prominent player in critical digital infrastructure, is set to enhance its leadership team with...

Major Drug Bust on Dark Web Seizes Thousands of Pills and $400K Ferrari

Ontario Provincial Police Strike Major Blow Against Dark Web Drug Trade Dismantling an Online Narcotics Network The Ontario Provincial Police (OPP) recently completed a groundbreaking operation...

Exploring Australia’s Innovative Modern Defensible Architecture

Evolving Security Threats: Strategies to Fortify Your Organization As we dive into the year, it’s clear that organizations are grappling with an array of ever-changing...

Sheikh Hamdan Connects with UAE Space Startups as Nation Becomes a Global Space Hub

Sheikh Hamdan Engages with UAE Space Sector Startups A Vision for the Future Sheikh Hamdan bin Mohammed bin Rashid Al Maktoum, the Crown Prince of Dubai...