CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
3Tags
Description
Workbench is a suite of tools for administrators and developers to interact with Salesforce.com organizations via the Force.com APIs. Prior to 65.0.0, Workbench contains remote code execution vulnerability in the timezone conversion flow, which processes attacker-controlled cookie values in an unsafe manner. This vulnerability is fixed in 65.0.0.
Analysis
Remote code execution in Workbench for Salesforce (forceworkbench) prior to version 65.0.0 allows unauthenticated remote attackers to execute arbitrary code by injecting malicious payloads into timezone conversion cookie parameters. The vulnerability stems from unsafe processing of attacker-controlled cookie values (CWE-94: Code Injection). …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all instances of Workbench for Salesforce in use and document current versions; communicate vulnerability to affected teams and restrict non-essential Workbench access. Within 7 days: Upgrade all Workbench for Salesforce deployments to version 65.0.0 or later per vendor advisory. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-19450