By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud
Computing

Researchers Uncover 20+ Configuration Risks, Including Five CVEs, in Salesforce Industry Cloud

News Room
Last updated: 2025/06/10 at 3:59 PM
News Room Published 10 June 2025
Share
SHARE

Jun 10, 2025Ravie LakshmananVulnerability / SaaS Security

Cybersecurity researchers have uncovered over 20 configuration-related risks affecting Salesforce Industry Cloud (aka Salesforce Industries), exposing sensitive data to unauthorized internal and external parties.

The weaknesses affect various components like FlexCards, Data Mappers, Integration Procedures (IProcs), Data Packs, OmniOut, and OmniScript Saved Sessions.

“Low-code platforms such as Salesforce Industry Cloud make building applications easier, but that convenience can come at a cost if security isn’t prioritized,” Aaron Costello, chief of SaaS Security Research at AppOmni, said in a statement shared with The Hacker News.

These misconfigurations, if left unaddressed, could allow cybercriminals and unauthorized to access encrypted confidential data on employees and customers, session data detailing how users have interacted with Salesforce Industry Cloud, credentials for Salesforce and other company systems, and business logic.

Cybersecurity

Following responsible disclosure, Salesforce has addressed three of the shortcomings and issued configuration guidance for another two. The remaining 16 misconfigurations have been left to the customers to fix them on their own.

The vulnerabilities that have been assigned CVE identifiers are listed below –

  • CVE-2025-43697 (CVSS score: N/A) – If ‘Check Field Level Security’ is not enabled for ‘Extract’ and ‘Turbo Extract Data Mappers, the ‘View Encrypted Data’ permission check is not enforced, exposing cleartext values for the encrypted fields to users with access to a given record
  • CVE-2025-43698 (CVSS score: N/A) – The SOQL data source bypasses any Field-Level Security when fetching data from Salesforce objects
  • CVE-2025-43699 (CVSS score: 5.3) – Flexcard does not enforce the ‘Required Permissions’ field for the OmniUlCard object
  • CVE-2025-43700 (CVSS score: 7.5) – Flexcard does not enforce the ‘View Encrypted Data’ permission, returning plaintext values for data that uses Classic Encryption
  • CVE-2025-43701 (CVSS score: 7.5) – FlexCard allows Guest Users to access values for Custom Settings

Put simply, attackers can weaponize these issues to bypass security controls and extract sensitive customer or employee information.

AppOmni said CVE-2025-43967 and CVE-2025-43698 have been tackled through a new security setting called “EnforceDMFLSAndDataEncryption” that customers will have to enable to ensure that only users with the “View Encrypted Data” permission may see the plaintext value of fields returned by the Data Mapper.

“For organizations subject to compliance mandates such as HIPAA, GDPR, SOX, or PCI-DSS, these gaps can represent real regulatory exposure,” the company said. “And because it is the customer’s responsibility to securely configure these settings, a single missed setting could lead to the breach of thousands of records, with no vendor accountability.”

When reached for comment, a Salesforce spokesperson told The Hacker News that a vast majority of the issues “stem from customer configuration issues” and are not vulnerabilities inherent to the application.

“All issues identified in this research have been resolved, with patches made available to customers, and official documentation updated to reflect complete configuration functionality,” the company said. “We have not observed any evidence of exploitation in customer environments as a result of these issues.”

The disclosure comes as security researcher Tobia Righi, who goes by the handle MasterSplinter, disclosed a Salesforce Object Query Language (SOQL) injection vulnerability that could be exploited to access sensitive user data.

Cybersecurity

The zero-day vulnerability (no CVE) exists in a default aura controller present in all Salesforce deployments, arising as a result of a user-controlled “contentDocumentId” parameter that’s unsafely embedded into “aura://CsvDataImportResourceFamilyController/ACTION$getCsvAutoMap” that creates a pathway for SOQL injection.

Successful exploitation of the flaw could have enabled attackers to insert additional queries through the parameter and extract database contents. The exploit could be further augmented by passing a list of IDs correlated to ContentDocument objects that are not public so as to gather information about uploaded documents.

The IDs, Righi said, can be generated by means of a publicly-available brute-force script that can generate possible previous or next Salesforce IDs based on a valid input ID. This, in turn, is made possible owing to the fact that Salesforce IDs do not actually provide a security boundary and are actually somewhat predictable.

“As noted in the research, after receiving the report, our security team promptly investigated and resolved the issue. We have not observed any evidence of exploitation in customer environments,” the Salesforce spokesperson said. “We appreciate Tobia’s efforts to responsibly disclose this issue to Salesforce, and we continue to encourage the security research community to report potential issues through our established channels.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Hate earbuds? Shop the Shokz OpenRun Pro — now $55 off.
Next Article Big Picture Savings: This Anker Nebula Projector Is Marked Down by $130
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Trending Memes in 2024: The Top Memes on Social Media This Month |
Computing
macOS Tahoe completely ruins the beloved Finder icon
News
​​Baidu-Geely JV is the latest EV maker struggling with money issues · TechNode
Computing
Kevin O'Leary on 'little' Trump-Musk fight: 'So what?'
News

You Might also Like

Computing

Trending Memes in 2024: The Top Memes on Social Media This Month |

2 Min Read
Computing

​​Baidu-Geely JV is the latest EV maker struggling with money issues · TechNode

3 Min Read
Computing

What Happens When You Pivot to a Reels-only Strategy on Instagram? |

8 Min Read
Computing

Xiaomi announces the upcoming launch of its first AI PC · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?