Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Critical Vulnerability in Salesforce AgentForce Exposed
News

Critical Vulnerability in Salesforce AgentForce Exposed

Team-CWDBy Team-CWDSeptember 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A critical vulnerability chain in Salesforce’s AI-powered AgentForce platform has been discovered by cybersecurity researchers.

The flaw, known as ForcedLeak, carried a severity score of 9.4 and could have allowed attackers to steal sensitive CRM data through indirect prompt injection.

Salesforce has since patched the issue by enforcing Trusted URLs and re-securing an expired domain that attackers could have exploited.

Noma Security, which identified the problem, said the findings highlight how AI agents present an expanded attack surface compared to traditional chatbots.

Understanding the ForcedLeak Vulnerability 

Unlike conventional prompt-response systems, AI agents such as AgentForce operate with autonomy. They can plan, execute, and respond based on multiple inputs without human oversight.

Noma Security showed how attackers could embed malicious instructions in Salesforce’s Web-to-Lead forms, stored as customer data. When employees later queried AgentForce, the system processed both legitimate requests and the hidden malicious commands.

“Indirect Prompt Injection is basically cross-site scripting, but instead of tricking a database into doing or divulging things it shouldn’t, the attackers get the inline AI to do it,” Andy Bennett, CISO at Apollo Information Systems, said. “It is like a mix of scripted attacks and social engineering.”

Read more on AI security governance: Why Shadow AI Is the Next Big Governance Challenge for CISOs

The research also found that Salesforce’s Content Security Policy whitelist included an expired domain. Attackers could purchase it cheaply and then use it to exfiltrate CRM data, such as customer contact information, sales pipeline details, and internal communications.

“It’s advisable to secure the systems around the AI agents in use, which include APIs, forms, and middleware, so that prompt injection is harder to exploit and less harmful if it succeeds,” Chrissa Constantine, senior cybersecurity solution architect at Black Duck, said.

Recommended Safeguards

Organizations using Salesforce AgentForce with Web-to-Lead enabled should also:

  • Apply Salesforce patches to enforce Trusted URLs for AgentForce and Einstein AI immediately

  • Audit existing lead data for suspicious submissions containing unusual instructions

  • Enforce strict tool-calling security guardrails and detect prompt injection in real-time

As Bennett noted, AI-driven attacks can move “at the speed of a machine,” making damage both faster and more extensive.

The ForcedLeak disclosure serves as a reminder that businesses adopting autonomous AI must prioritize security governance, continuous testing and strict controls to protect against evolving threats.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRethinking AI Data Security: A Buyer’s Guide 
Next Article Chinese Hackers Use ‘BRICKSTORM’ Backdoor to Breach US Firms
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Your information is on the dark web. What happens next?

January 13, 2026

Find your weak spots before attackers do

November 21, 2025

How to help older family members avoid scams

October 31, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.