Salesforce Cloud Exposed by Zero-Days and Misconfigurations

Article Highlights
Off On

Critical Vulnerabilities in Salesforce Cloud Components

The revelation of critical vulnerabilities in Salesforce’s cloud components has sparked significant concerns about data security and regulatory compliance. Five zero-day vulnerabilities, alongside over 20 misconfigurations, have been uncovered by cybersecurity researcher Aaron Costello, Chief of SaaS Security Research at AppOmni. These vulnerabilities threaten the security of Salesforce’s widely-used industry cloud offerings, which are integral tools for businesses designing industry-specific applications. In particular, flaws in configurations could potentially expose sensitive data, including employee and customer information. These newly discovered security lapses highlight the intricate challenges faced by organizations relying on cloud services, emphasizing the necessity for diligent oversight and regular security evaluations.

Vulnerabilities and Misconfigurations

In June, Costello brought to light various security issues plaguing Salesforce’s OmniStudio suite, a component of its industry cloud offerings. Key products like FlexCards, Integration Procedures, and Data Mappers were found vulnerable. Misconfigurations in these elements invite opportunities for unauthorized data access, creating loopholes for malicious actors to exploit sensitive information such as session logs and credentials. Although Salesforce’s Vlocity suite remains unscathed, Costello warned that similar risks loom, given its shared feature sets with OmniStudio. AppOmni’s findings prompted Salesforce to act swiftly, addressing identified vulnerabilities by assigning them Common Vulnerabilities and Exposures (CVE) identifiers.

The five vulnerabilities identified were notably severe. Three have already been resolved by Salesforce, while the remaining two await customer-configurable security settings to bolster defenses. Particularly, CVE-2025-4399, CVE-2025-43700, and CVE-2025-43701 involving FlexCards were promptly fixed. These flaws ranged from insufficient enforcement of required permissions to allowing guest user access to sensitive settings. In contrast, CVE-2025-43697 and CVE-2025-43698, impacting Data Mappers and FlexCards respectively, require additional user intervention to secure data effectively, underscoring the importance of an organization’s active role in maintaining its cybersecurity posture.

Salesforce’s Response and Recommendations

In response to the vulnerabilities, Salesforce has proactively communicated with its customers, disseminating patches and updated documentation to ensure all configurations are correctly addressed. The expedient resolution of three FlexCards vulnerabilities demonstrates Salesforce’s commitment to securing its cloud offerings. Salesforce assures that there has been no exploitation of these gaps in customer environments. However, the firm has implemented user-configurable settings to deal with the remaining two vulnerabilities, putting the onus on customers to enact necessary security measures.

To address these issues, AppOmni has provided specific guidelines to mitigate risks associated with Data Mappers and FlexCards. Customers are advised to enforce Field Level Security (FLS) and data encryption through Salesforce’s Omni Interaction Configuration. Detailed steps include setting up new configurations to enhance protections, ensuring only authorized users can access encrypted data without compromising the system’s integrity. Such measures are crucial to safeguard against potential breaches, protecting sensitive organizational and client data.

Regulatory Implications and Recent Security Concerns

The findings from AppOmni also highlight the significant regulatory risks posed by these security lapses. Organizations governed by compliance frameworks such as HIPAA, SOX, GDPR, and PCI-DSS face increased exposure if configurations are improperly handled. A single oversight in settings could result in massive data breaches, incurring severe legal and financial repercussions. The shift of responsibility to customers for securing configurations underscores the growing complexity of balancing usability with security in cloud-based environments.

The timing of these revelations parallels findings by Google Cloud’s Mandiant, which warned of cyber threats from groups manipulating Salesforce’s Data Loader tool. Such incidents reinforce the urgency for organizations to rigorously monitor and secure their cloud interfaces. As cyber threats evolve, vigilance and proactive security measures are vital. Companies must remain acutely aware of their role in maintaining secure systems and stay updated on potential vulnerabilities to safeguard against emerging threats. This approach helps mitigate risks associated with data breaches, ensuring compliance with stringent regulatory standards.

Ensuring Future Security and Compliance

In June, Costello highlighted critical security issues within Salesforce’s OmniStudio suite, part of its industry cloud services. Vulnerabilities were discovered in major components like FlexCards, Integration Procedures, and Data Mappers, due to misconfigurations that permit unauthorized data access, posing risks to sensitive data like session logs and credentials. Although the Vlocity suite was intact, Costello cautioned about potential threats given shared features with OmniStudio. AppOmni’s report urged Salesforce to act quickly, addressing vulnerabilities by assigning Common Vulnerabilities and Exposures (CVE) identifiers. Among five severe vulnerabilities detected, three have been resolved by Salesforce, while two await enhanced security settings managed by customers. Specifically, CVE-2025-4399, CVE-2025-43700, and CVE-2025-43701 linked to FlexCards were addressed, focusing on insufficient permission enforcement and unwanted guest user access. Conversely, CVE-2025-43697 and CVE-2025-43698 in Data Mappers and FlexCards demand further user action for data security, highlighting the crucial role organizations play in bolstering their cybersecurity defenses.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the