Article Details
Scrape Timestamp (UTC): 2025-06-11 18:04:08.804
Source: https://www.theregister.com/2025/06/11/salesforce_cves_misconfigs/
Original Article Text
Click to Toggle View
Salesforce tags 5 CVEs after SaaS security probe uncovers misconfig risks. The 16 other flagged issues are on customers, says CRM giant. Salesforce has assigned five CVE identifiers following a security report that uncovered more than 20 configuration weaknesses, some of which exposed customers to unauthorized access and session hijacking. The vulnerabilities were made public this week after admins were notified of the flaws in May. Aaron Costello, AppOmni chief of SaaS security research who made the findings, said all five CVEs were associated with Flexcards, Data Mappers, and other core components of Salesforce Industries. Salesforce did not deem the other 16 flaws Costello reported worthy of CVEs, but instead classified them as misconfigurations, placing the responsibility for addressing them on the customer. "These findings revealed how default settings and some insecure patterns that are the responsibility of the customers to configure and use correctly, can lead to unauthorized access to encrypted fields, session stealing, credentials, and business logic," he said. "For organizations using Salesforce industry clouds, these findings underscore an urgent need to assess and secure your configuration before attackers can exploit any misconfigurations," Costello added. Salesforce issued four CVEs related to the Flexcard UI-building tools, none of which have been assigned severity scores: The final CVE relates to Data Mappers, which allow customers to read, transform, and write Salesforce data: Salesforce's industry clouds offer both technical and non-technical users a low-code platform to build business logic that can make use of the company's most sensitive data. It increases the potential pool of innovators within a workplace, but it also means that these platforms can be misconfigured in one way or another, exposing security gaps. The misconfigurations in other components that did not have CVEs assigned related to Flexcards and Data Mappers, but also Integration procedures, Data Packs, OmniOut, and OmniScript Saved Sessions. The exact details of these are listed in Costello's research paper, but broadly the consequences of these include the decryption of data, unauthorized accesses to credentials and APIs, and session data leaks. The researcher said the responsibility for securing these settings falls to the customer, and even a single misconfiguration "could lead to the breach of thousands of records, with no vendor accountability." "Security is not optional, and default settings prioritize usability. These vulnerabilities weren't bugs. They were design decisions made for usability. But in industries where data sensitivity is high, that usability needs to be rebalanced with security rigor," he added. "The solution isn't panic; it's discipline. Apply the same scrutiny to industry cloud components that you would to any production code. Test, audit, and configure defensively." Salesforce admins are advised to read AppOmni's recommended actions, which can be found in its report, but they essentially boil down to ensuring field-level security is enforced, increasing components' permission requirements, applying regular updates, and using private – not public – caching mechanisms to protect user data.
Daily Brief Summary
Salesforce has assigned five new CVEs related to the Flexcards and Data Mappers in their CRM system following a security evaluation.
Over 20 configuration issues were reported, exposing risks such as unauthorized access and session hijacking; however, only five were considered for CVE labeling.
Misconfigurations identified by AppOmni were not classified by Salesforce as CVEs, pushing the responsibility for security fixes onto the customers.
These vulnerabilities mainly involve default settings and poor configuration choices by users, which can lead to severe security breaches involving sensitive data access.
Salesforce advises customers to rigorously assess and secure their configurations to prevent potential exploitations by attackers.
Aaron Costello from AppOmni highlighted the necessity for organizations using Salesforce's industry clouds to enforce field-level security and apply regular updates.
The report by Costello also recommended increasing the component permission requirements and using private caching methods to enhance data protection.