Critical Tableau Server Flaw Allows Attackers to Upload and Execute Malicious Files

add a heading (1)

A severe security flaw has been discovered in Tableau Server, which could allow attackers to upload and execute malicious files, leading to full system takeover.

This vulnerability, tracked as CVE-2025-26496 with a CVSS score of 9.6, impacts several versions of Tableau Server and Tableau Desktop on both Windows and Linux platforms.

Key Highlights

  1. Attackers can exploit Tableau Server to upload harmful files and execute arbitrary code using type confusion techniques.
  2. Five vulnerabilities were identified, enabling file upload bypasses and path traversal attacks.
  3. Immediate patching is required for all vulnerable Tableau Server versions.

Tableau Server File Upload Flaws

Salesforce Security uncovered five distinct weaknesses during a proactive audit. Fixes were rolled out in the July 22, 2025 Maintenance Release.

The most dangerous issue, CVE-2025-26496, stems from Type Confusion within the File Upload modules. This flaw could allow Local Code Inclusion attacks, enabling execution of malicious scripts on compromised systems.

Affected Versions:

  • Tableau Server before 2025.1.4
  • Tableau Server before 2024.2.13
  • Tableau Server before 2023.3.20

The flaw occurs when the system mishandles data types during file processing, allowing attackers to bypass controls and execute arbitrary payloads.

Additional File Upload Vulnerabilities

Two other dangerous bugs, CVE-2025-26497 and CVE-2025-26498 (both CVSS 7.7), were also reported. These involve Unrestricted File Uploads within the Flow Editor and establish-connection-no-undo modules.

Attackers could abuse these flaws to launch Absolute Path Traversal attacks, enabling them to plant files in arbitrary server directories.

Path Traversal Weaknesses

Two high-severity path traversal bugs were also confirmed:

  • CVE-2025-52450 – Improper restriction of directory paths (CVSS 8.5).
  • CVE-2025-52451 – Improper input validation (CVSS 8.5).

These impact the tabdoc API (create-data-source-from-file-upload modules).
Attackers can exploit weak validation to bypass path sanitization using double encoding (%252e%252e%252f) or Unicode tricks, allowing access to sensitive files or even overwriting system configs.

Such exploitation could result in persistent access via webshells, data theft, or privilege escalation inside enterprise networks.

IOCs (Indicators of Compromise)

CVE IDVulnerability TypeCVSS 3.1 ScoreSeverity
CVE-2025-26496Type Confusion in File Upload (Local Code Inclusion)9.6Critical
CVE-2025-26497Dangerous File Upload in Flow Editor7.7High
CVE-2025-26498Dangerous File Upload in establish-connection module7.7High
CVE-2025-52450Path Traversal – Improper Directory Restriction8.5High
CVE-2025-52451Path Traversal – Improper Input Validation8.5High

Recommended Actions

  • Upgrade immediately to the patched Tableau Server versions released on July 22, 2025.
  • Review access logs for abnormal file upload activity.
  • Deploy Web Application Firewall (WAF) rules to detect and block path traversal attempts.
  • Perform post-patch security checks to confirm systems were not previously compromised.

image import

Failure to patch leaves organizations exposed to remote code execution, ransomware deployment, and data breaches. Security teams must treat this as a high-priority emergency.