Description

Salesforce has addressed multiple high-impact vulnerabilities in its Marketing Cloud (SFMC) platform that could have enabled attackers to access sensitive marketing data across tenants. The flaws exposed risks in email templating and cryptographic implementations, potentially allowing unauthorized enumeration of subscriber records and email content. While no active exploitation has been confirmed, the vulnerabilities posed significant risks to enterprises relying on SFMC for large-scale campaign management. The first issue stemmed from SFMC’s server-side templating engines, including AMPScript and Server-Side JavaScript (SSJS). Functions such as TreatAsContent allowed user-supplied input to be evaluated as executable template code. Additionally, legacy behavior caused email subject lines to be evaluated twice, enabling attackers to inject payloads via subscriber attributes. Successful exploitation allowed execution of template logic and querying of internal Data Views like Subscribers, Sent, and Click, exposing sensitive campaign and user data. A more critical flaw involved the view email in browser and CloudPages functionality. These features relied on encrypted query string (qs) parameters. Researchers discovered that the legacy encryption used unauthenticated CBC mode, vulnerable to padding oracle attacks. This allowed attackers to decrypt and forge query parameters. Combined with static cryptographic keys shared across tenants, attackers could potentially access data across multiple organizations. An older XOR-based encryption scheme further weakened security, enabling rapid decryption and enumeration of identifiers such as JobID and subscriber details.