Salesforce Cloud Exposed by Zero-Days and Misconfigurations

Article Highlights
Off On

Critical Vulnerabilities in Salesforce Cloud Components

The revelation of critical vulnerabilities in Salesforce’s cloud components has sparked significant concerns about data security and regulatory compliance. Five zero-day vulnerabilities, alongside over 20 misconfigurations, have been uncovered by cybersecurity researcher Aaron Costello, Chief of SaaS Security Research at AppOmni. These vulnerabilities threaten the security of Salesforce’s widely-used industry cloud offerings, which are integral tools for businesses designing industry-specific applications. In particular, flaws in configurations could potentially expose sensitive data, including employee and customer information. These newly discovered security lapses highlight the intricate challenges faced by organizations relying on cloud services, emphasizing the necessity for diligent oversight and regular security evaluations.

Vulnerabilities and Misconfigurations

In June, Costello brought to light various security issues plaguing Salesforce’s OmniStudio suite, a component of its industry cloud offerings. Key products like FlexCards, Integration Procedures, and Data Mappers were found vulnerable. Misconfigurations in these elements invite opportunities for unauthorized data access, creating loopholes for malicious actors to exploit sensitive information such as session logs and credentials. Although Salesforce’s Vlocity suite remains unscathed, Costello warned that similar risks loom, given its shared feature sets with OmniStudio. AppOmni’s findings prompted Salesforce to act swiftly, addressing identified vulnerabilities by assigning them Common Vulnerabilities and Exposures (CVE) identifiers.

The five vulnerabilities identified were notably severe. Three have already been resolved by Salesforce, while the remaining two await customer-configurable security settings to bolster defenses. Particularly, CVE-2025-4399, CVE-2025-43700, and CVE-2025-43701 involving FlexCards were promptly fixed. These flaws ranged from insufficient enforcement of required permissions to allowing guest user access to sensitive settings. In contrast, CVE-2025-43697 and CVE-2025-43698, impacting Data Mappers and FlexCards respectively, require additional user intervention to secure data effectively, underscoring the importance of an organization’s active role in maintaining its cybersecurity posture.

Salesforce’s Response and Recommendations

In response to the vulnerabilities, Salesforce has proactively communicated with its customers, disseminating patches and updated documentation to ensure all configurations are correctly addressed. The expedient resolution of three FlexCards vulnerabilities demonstrates Salesforce’s commitment to securing its cloud offerings. Salesforce assures that there has been no exploitation of these gaps in customer environments. However, the firm has implemented user-configurable settings to deal with the remaining two vulnerabilities, putting the onus on customers to enact necessary security measures.

To address these issues, AppOmni has provided specific guidelines to mitigate risks associated with Data Mappers and FlexCards. Customers are advised to enforce Field Level Security (FLS) and data encryption through Salesforce’s Omni Interaction Configuration. Detailed steps include setting up new configurations to enhance protections, ensuring only authorized users can access encrypted data without compromising the system’s integrity. Such measures are crucial to safeguard against potential breaches, protecting sensitive organizational and client data.

Regulatory Implications and Recent Security Concerns

The findings from AppOmni also highlight the significant regulatory risks posed by these security lapses. Organizations governed by compliance frameworks such as HIPAA, SOX, GDPR, and PCI-DSS face increased exposure if configurations are improperly handled. A single oversight in settings could result in massive data breaches, incurring severe legal and financial repercussions. The shift of responsibility to customers for securing configurations underscores the growing complexity of balancing usability with security in cloud-based environments.

The timing of these revelations parallels findings by Google Cloud’s Mandiant, which warned of cyber threats from groups manipulating Salesforce’s Data Loader tool. Such incidents reinforce the urgency for organizations to rigorously monitor and secure their cloud interfaces. As cyber threats evolve, vigilance and proactive security measures are vital. Companies must remain acutely aware of their role in maintaining secure systems and stay updated on potential vulnerabilities to safeguard against emerging threats. This approach helps mitigate risks associated with data breaches, ensuring compliance with stringent regulatory standards.

Ensuring Future Security and Compliance

In June, Costello highlighted critical security issues within Salesforce’s OmniStudio suite, part of its industry cloud services. Vulnerabilities were discovered in major components like FlexCards, Integration Procedures, and Data Mappers, due to misconfigurations that permit unauthorized data access, posing risks to sensitive data like session logs and credentials. Although the Vlocity suite was intact, Costello cautioned about potential threats given shared features with OmniStudio. AppOmni’s report urged Salesforce to act quickly, addressing vulnerabilities by assigning Common Vulnerabilities and Exposures (CVE) identifiers. Among five severe vulnerabilities detected, three have been resolved by Salesforce, while two await enhanced security settings managed by customers. Specifically, CVE-2025-4399, CVE-2025-43700, and CVE-2025-43701 linked to FlexCards were addressed, focusing on insufficient permission enforcement and unwanted guest user access. Conversely, CVE-2025-43697 and CVE-2025-43698 in Data Mappers and FlexCards demand further user action for data security, highlighting the crucial role organizations play in bolstering their cybersecurity defenses.

Explore more

AI Redefines Software Engineering as Manual Coding Fades

The rhythmic clacking of mechanical keyboards, once the heartbeat of Silicon Valley innovation, is rapidly being replaced by the silent, instantaneous pulse of automated script generation. For decades, the ability to hand-write complex logic in languages like Python, Java, or C++ served as the ultimate gatekeeper to a world of prestige and high compensation. Today, that gate is being dismantled

Is Writing Code Becoming Obsolete in the Age of AI?

The 3,000-Developer Question: What Happens When the Keyboard Goes Quiet? The rhythmic tapping of mechanical keyboards that once echoed through every software engineering hub has gradually faded into a thoughtful silence as the industry pivots toward autonomous systems. This transformation was the focal point of a recent gathering of over 3,000 developers who sought to define their roles in a

Skills-Based Hiring Ends the Self-Inflicted Talent Crisis

The persistent disconnect between a company’s inability to fill open roles and the record-breaking volume of incoming applications suggests that modern recruitment has become its own worst enemy. While 65% of HR leaders believe the hiring power dynamic has finally shifted back in their favor, a staggering 62% simultaneously claim they are trapped in a persistent talent crisis. This paradox

AI and Gen Z Are Redefining the Entry-Level Job Market

The silent hum of a server rack now performs the tasks once reserved for the bright-eyed college graduate clutching a fresh diploma and a stack of business cards. This mechanical evolution represents a fundamental dismantling of the traditional corporate hierarchy, where the entry-level role served as a primary training ground for future leaders. As of 2026, the concept of “paying

How Can Recruiters Shift From Attraction to Seduction?

The traditional recruitment funnel has transformed into a complex psychological maze where simply posting a vacancy no longer guarantees a single qualified applicant. Talent acquisition teams now face a reality where the once-reliable job boards remain silent, reflecting a fundamental shift in how professionals view career mobility. This quietude signifies the end of a passive era, as the modern talent