Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Salesforce Industry Cloud riddled with configuration risks

Salesforce Industry Cloud customers can easily misconfigure their deployments to enable attackers to access encrypted customer information, session data, credentials, and business logic, security researchers have found.

The Salesforce Industry Cloud suite of vertical-aligned solutions includes a low-code platform that provides pre-built digital transformations tools for specific industries, such as financial services and manufacturing.

Aimed at non-developers, low-code tools can allow “non-technical users to build logic that touches critical systems and sensitive customer and internal data,” said Aaron Costello, chief of SaaS security research at AppOmni, in a report that identified 20 misconfiguration risks associated with Salesforce Industry Cloud’s OmniStudio low-code offering.

“But this empowerment can come at a cost with respect to security, drastically increasing the risk of misconfigurations by customers,” Costello noted. “This combination of flexibility and implicit trust means that a customer misconfiguring one component, or overlooking one setting, can lead to system-wide data exposure.”

Among the risks identified by Costello and AppOmni were:

  • Low-code components that do not enforce access control checks or respect encrypted data fields by default
  • Workflow code that is executable by external or unauthenticated users
  • Caching mechanisms that can lead to bypassed access controls
  • Poorly developed off-platform applications that can result in API token theft
  • Sensitive API keys and other data embedded directly into components that can be read without permissions
  • Insecure permissions on saved workflows

Of the 20 misconfiguration risks identified by AppOmni, Salesforce has issued CVEs and guidance to prevent five. The rest have been left to customers to avoid.

Salesforce issues five CVEs

The five CVEs Salesforce issued involve problems discovered in OmniStudio’s FlexCards and Data Mappers components. Salesforce notified customers on May 19 about the issues.

FlexCards, which fetch data from Salesforce and third-party sources for use in workflows or for display in customer-facing web views, accounted for four of the CVEs:

  • CVE-2025-43698: The SOQL data source ignores field-level security (FLS), exposing all field data for records.
  • CVE-2025-43699: The “Required Permissions” field can be bypassed due to the check being performed client-side.
  • CVE-2025-43700: The “View Encrypted Data” permission is not enforced, returning plaintext values for data that uses Classic Encryption to unauthorized users.
  • CVE-2025-43701: Allows Guest Users to access values for Custom Settings.

Data Mappers is a feature available as an option for FlexCards datasources or as an action as part of back-end Integration Procedures (IProcs) for server-side data processing. Data Mappers read and transform data into formats suitable for use in APIs or Salesforce objects.

Costello found that two of the four Data Mapper types — Extract and Turbo Extract — do not enforce FLS by default and return plaintext data of encrypted values to users without permissions to see them. Salesforce assigned CVE-2025-43697 to this issue.

Additional configuration risks

Fifteen other configuration patterns can also have serious security implications for Salesforce Industry Cloud customers.

For example, Data Mappers and IProc metadata are cached using a mechanism known as Scale Cache to speed up execution in the future. While users need Sharing Rules configured in order to execute Data Mappers or IProcs, Costello found that once they’re cached, these components become executable by any user regardless of permissions.

“Unfortunately there is no configuration setting that allows for the use of the Scale Cache while also respecting Data Mapper security controls,” Costello said. “After thorough testing, including the enablement of the CheckCachedMetadataRecordSecurity OmniStudio setting, it was revealed that the only way to enforce authorization checks for Data Mappers is to turn the Scale Cache off completely.”

Integration Procedures also don’t respect the “Required Permission” setting nor the Sharing Rules of any Data Mapper or other IProc they call as part of their actions. This behavior is documented by Salesforce but is extremely risky, because users only need to satisfy the access control of the initial IProc to call any Data Mapper or IProc involved in its process flow.

“Organizations may have widely accessible IProcs that call upon powerful actions under the misconception that the permission requirements of all of an IProc’s actions will be evaluated for the calling user,” Costello said.

Another common configuration risk involves HTTP actions commonly used as part of IProcs to communicate with external APIs. If those APIs require authentication, organizations might decide to hardcode usernames and passwords or API access tokens directly into the body of the IProc. Anyone who can execute an IProc can also see the hardcoded values stored within. In many cases, this includes external users or even guest users who can execute IProcs in debug mode.

FlexCards and IProcs support a data source type called Remote Actions that allows the execution of Apex classes. Apex is Salesforce’s Java-like object-oriented language for building applications on its platform.

When an OmniStudio component attempts to execute an Apex class through Remote Actions, the request is proxied through the BusinessProcessDisplayController Apex class, which includes a GenericInvoke2NoCont method. This method does not validate whether the calling user has permission to access the Remote Action.

“This results in an authorization bypass which may allow for both internal and external users to execute powerful Apex code that runs without sharing or does not implement security measures such as FLS,” Costello said, adding that this is the default behavior.

Another feature that can generate sensitive information exposure is Data Packs, which can export and import components to other Salesforce instances. This feature leaves artefacts in the form of JSON definition files that can contain dependent objects such as IProcs that further contain Data Mappers.

“A user with read access rights to this object and excessively broad Sharing Rules will have the ability to download the Data Pack component JSON files that are stored within the ‘Attachment’ sObject,” Costello said. “Notably, since these attachments solely rely on access checks on the OmniDataPack’s ‘Id’ field, users do not need any field-level permissions on the ‘OmniDataPack’ sObject to access these files, only permissions at the object and Sharing Rule level.”

Data Packs can also become orphaned, for example, if the user creating them presses the cancel button during the process. In this case, their attachments get created and never removed. Worse, they are not listed on the Data Packs inventory page in OmniStudio, making it harder for admins to detect them.

When embedded in an external website, FlexCard or OmniScript components need an access token to access Salesforce. These tokens must be created using an OmniOut app. However, a website’s end-user can inspect the API requests locally in their browsers and extract this token, which can then be misused. Costello recommends that companies use a proxy for communication between external OmniStudio components and Salesforce.

A proxy, however, won’t help when the token itself is embedded in OmniOut code that has been compromised or stored in public version control systems like GitHub. Furthermore, a proxy could introduce risks if it’s poorly configured to forward requests without validation, as users could attempt to tamper with parameters and values.

“Since OmniOut typically relies on authenticated Salesforce APIs, this account requirement is satisfied by providing the OmniOut component with a Connected App access token which will be used to make requests on behalf of all external users,” the researcher noted. “While not explicitly stated in the Salesforce documentation that details the Connected App creation process, it’s imperative that organizations do not generate an access token for OmniOut that is tied to a privileged account such as System Administrator.”

Finally, OmniScripts, which tie together multiple back-end operations through IProcs, Data Mappers, and FlexCards, have a feature called Saved Session that allows users to save their progress and return to the script later. When such sessions are generated, a record is created in the OmniScript Saved Session sObject along with any data entered or returned by the script until being saved. By default there is no expiration time for these saved sessions.

“Although Guest and/or Community Site users do not have the ability to save their own sessions, it does not prevent them reading the data of other user sessions if they are granted the permissions to do so, making this attack vector a risk that could be taken advantage of by both internal and external identities,” the researcher found.

Mitigation

For the insecure configurations that Salesforce has not already fixed, AppOmni provides mitigation recommendations in its paper, including a list of objects that should have their object, field, and Sharing Rule configurations routinely audited. Reducing the access level for OmniStudio sObjects and their records to only what’s necessary is the first line of defense, the company said.


Read More from This Article: Salesforce Industry Cloud riddled with configuration risks
Source: News

Category: NewsJune 16, 2025
Tags: art

Post navigation

PreviousPrevious post:디도스, 이제는 전략적 위협…아태지역 금융권 대상 공격 245% 급증NextNext post:The augmented IT team: How AI is reshaping IT roles and skills for the future

Related posts

“엉터리 데이터, AI 성과 두 배로 망쳐”···글로벌 CIO 4인이 제시한 AI 시대의 데이터 관리 해법
June 17, 2025
중간 경력을 잡아라··· CISO들의 사이버 인재 확보 전략은?
June 17, 2025
‘데이터브릭스 데이터+AI 서밋 2025’ 데이터 전문가를 위한 5가지 핵심 사항
June 17, 2025
Le 5 principali barriere al successo dell’AI secondo i leader IT
June 17, 2025
AI 아바타 시장 2032년까지 33.1% 성장 전망···마켓앤마켓, 개인화된 고객 경험 증가가 성장 견인
June 17, 2025
기술 파트너십이 기업 혁신에 필요한 이유 6가지
June 17, 2025
Recent Posts
  • “엉터리 데이터, AI 성과 두 배로 망쳐”···글로벌 CIO 4인이 제시한 AI 시대의 데이터 관리 해법
  • 중간 경력을 잡아라··· CISO들의 사이버 인재 확보 전략은?
  • ‘데이터브릭스 데이터+AI 서밋 2025’ 데이터 전문가를 위한 5가지 핵심 사항
  • Le 5 principali barriere al successo dell’AI secondo i leader IT
  • AI 아바타 시장 2032년까지 33.1% 성장 전망···마켓앤마켓, 개인화된 고객 경험 증가가 성장 견인
Recent Comments
    Archives
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.