Salesforce Cloud Exposed by Zero-Days and Misconfigurations

Article Highlights
Off On

Critical Vulnerabilities in Salesforce Cloud Components

The revelation of critical vulnerabilities in Salesforce’s cloud components has sparked significant concerns about data security and regulatory compliance. Five zero-day vulnerabilities, alongside over 20 misconfigurations, have been uncovered by cybersecurity researcher Aaron Costello, Chief of SaaS Security Research at AppOmni. These vulnerabilities threaten the security of Salesforce’s widely-used industry cloud offerings, which are integral tools for businesses designing industry-specific applications. In particular, flaws in configurations could potentially expose sensitive data, including employee and customer information. These newly discovered security lapses highlight the intricate challenges faced by organizations relying on cloud services, emphasizing the necessity for diligent oversight and regular security evaluations.

Vulnerabilities and Misconfigurations

In June, Costello brought to light various security issues plaguing Salesforce’s OmniStudio suite, a component of its industry cloud offerings. Key products like FlexCards, Integration Procedures, and Data Mappers were found vulnerable. Misconfigurations in these elements invite opportunities for unauthorized data access, creating loopholes for malicious actors to exploit sensitive information such as session logs and credentials. Although Salesforce’s Vlocity suite remains unscathed, Costello warned that similar risks loom, given its shared feature sets with OmniStudio. AppOmni’s findings prompted Salesforce to act swiftly, addressing identified vulnerabilities by assigning them Common Vulnerabilities and Exposures (CVE) identifiers.

The five vulnerabilities identified were notably severe. Three have already been resolved by Salesforce, while the remaining two await customer-configurable security settings to bolster defenses. Particularly, CVE-2025-4399, CVE-2025-43700, and CVE-2025-43701 involving FlexCards were promptly fixed. These flaws ranged from insufficient enforcement of required permissions to allowing guest user access to sensitive settings. In contrast, CVE-2025-43697 and CVE-2025-43698, impacting Data Mappers and FlexCards respectively, require additional user intervention to secure data effectively, underscoring the importance of an organization’s active role in maintaining its cybersecurity posture.

Salesforce’s Response and Recommendations

In response to the vulnerabilities, Salesforce has proactively communicated with its customers, disseminating patches and updated documentation to ensure all configurations are correctly addressed. The expedient resolution of three FlexCards vulnerabilities demonstrates Salesforce’s commitment to securing its cloud offerings. Salesforce assures that there has been no exploitation of these gaps in customer environments. However, the firm has implemented user-configurable settings to deal with the remaining two vulnerabilities, putting the onus on customers to enact necessary security measures.

To address these issues, AppOmni has provided specific guidelines to mitigate risks associated with Data Mappers and FlexCards. Customers are advised to enforce Field Level Security (FLS) and data encryption through Salesforce’s Omni Interaction Configuration. Detailed steps include setting up new configurations to enhance protections, ensuring only authorized users can access encrypted data without compromising the system’s integrity. Such measures are crucial to safeguard against potential breaches, protecting sensitive organizational and client data.

Regulatory Implications and Recent Security Concerns

The findings from AppOmni also highlight the significant regulatory risks posed by these security lapses. Organizations governed by compliance frameworks such as HIPAA, SOX, GDPR, and PCI-DSS face increased exposure if configurations are improperly handled. A single oversight in settings could result in massive data breaches, incurring severe legal and financial repercussions. The shift of responsibility to customers for securing configurations underscores the growing complexity of balancing usability with security in cloud-based environments.

The timing of these revelations parallels findings by Google Cloud’s Mandiant, which warned of cyber threats from groups manipulating Salesforce’s Data Loader tool. Such incidents reinforce the urgency for organizations to rigorously monitor and secure their cloud interfaces. As cyber threats evolve, vigilance and proactive security measures are vital. Companies must remain acutely aware of their role in maintaining secure systems and stay updated on potential vulnerabilities to safeguard against emerging threats. This approach helps mitigate risks associated with data breaches, ensuring compliance with stringent regulatory standards.

Ensuring Future Security and Compliance

In June, Costello highlighted critical security issues within Salesforce’s OmniStudio suite, part of its industry cloud services. Vulnerabilities were discovered in major components like FlexCards, Integration Procedures, and Data Mappers, due to misconfigurations that permit unauthorized data access, posing risks to sensitive data like session logs and credentials. Although the Vlocity suite was intact, Costello cautioned about potential threats given shared features with OmniStudio. AppOmni’s report urged Salesforce to act quickly, addressing vulnerabilities by assigning Common Vulnerabilities and Exposures (CVE) identifiers. Among five severe vulnerabilities detected, three have been resolved by Salesforce, while two await enhanced security settings managed by customers. Specifically, CVE-2025-4399, CVE-2025-43700, and CVE-2025-43701 linked to FlexCards were addressed, focusing on insufficient permission enforcement and unwanted guest user access. Conversely, CVE-2025-43697 and CVE-2025-43698 in Data Mappers and FlexCards demand further user action for data security, highlighting the crucial role organizations play in bolstering their cybersecurity defenses.

Explore more

Jenacie AI Debuts Automated Trading With 80% Returns

We’re joined by Nikolai Braiden, a distinguished FinTech expert and an early advocate for blockchain technology. With a deep understanding of how technology is reshaping digital finance, he provides invaluable insight into the innovations driving the industry forward. Today, our conversation will explore the profound shift from manual labor to full automation in financial trading. We’ll delve into the mechanics

Chronic Care Management Retains Your Best Talent

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-yi Tsai offers a crucial perspective on one of today’s most pressing workplace challenges: the hidden costs of chronic illness. As companies grapple with retention and productivity, Tsai’s insights reveal how integrated health benefits are no longer a perk, but a strategic imperative. In our conversation, we explore

DianaHR Launches Autonomous AI for Employee Onboarding

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-Yi Tsai is at the forefront of the AI revolution in human resources. Today, she joins us to discuss a groundbreaking development from DianaHR: a production-grade AI agent that automates the entire employee onboarding process. We’ll explore how this agent “thinks,” the synergy between AI and human specialists,

Is Your Agency Ready for AI and Global SEO?

Today we’re speaking with Aisha Amaira, a leading MarTech expert who specializes in the intricate dance between technology, marketing, and global strategy. With a deep background in CRM technology and customer data platforms, she has a unique vantage point on how innovation shapes customer insights. We’ll be exploring a significant recent acquisition in the SEO world, dissecting what it means

Trend Analysis: BNPL for Essential Spending

The persistent mismatch between rigid bill due dates and the often-variable cadence of personal income has long been a source of financial stress for households, creating a gap that innovative financial tools are now rushing to fill. Among the most prominent of these is Buy Now, Pay Later (BNPL), a payment model once synonymous with discretionary purchases like electronics and