The numbers are getting harder to ignore.
ShinyHunters claims 300 to 400+ Salesforce customers were breached through Experience Cloud. (The Hacker News) Medtronic confirmed a breach tied to the same attack pattern. (Medtronic breach disclosure) Capsule Security just disclosed PipeLeak, a prompt injection vulnerability in Agentforce that lets attackers exfiltrate sensitive data through lead capture forms.
This isn’t a “maybe later” problem. It’s a “check your org today” problem.
And here’s the reality: none of these were platform bugs. (Salesforce Trust)
Every major attack vector this year follows the same story. Attackers aren’t breaking into Salesforce. They’re walking through doors your org left wide open.
What Attackers Are Exploiting in Your Salesforce Org Security
Overly Permissive Salesforce Guest User Profiles
The ShinyHunters group used a modified version of AuraInspector to scan thousands of public Experience Cloud sites simultaneously. They weren’t looking for a Salesforce flaw. They were looking for guest user profiles that had access to Account, Contact, or Opportunity objects. When those permissions exist, an attacker can query your CRM data directly through the guest endpoint. No login. No credentials. Just API calls against publicly exposed objects. Salesforce’s official advisory confirms this is the primary vector for the current wave of breaches.
Unsecured APIs and External Endpoints
Beyond the guest user issue, attackers have been exploiting third-party integrations. The BeyondTrust vulnerability that surfaced alongside the ShinyHunters campaign is a prime example. Every Connected App, every external endpoint, every API that doesn’t need to exist shouldn’t. Run a Connected App audit. Check CORS policies on any external-facing endpoints. Verify that API access follows the principle of least privilege. Most orgs have Connected Apps from three years ago that nobody remembers adding and nobody has ever audited.
Inadequate Access Controls Between User Roles
This gets worse with Agentforce and Headless 360. When your platform becomes more API-driven, the blast radius of loose permissions expands. A user who only needs to view records might have edit access. A permission set granted for a one-time project might still be active. With Headless 360 exposing capabilities via API and MCP, those excess permissions become attack vectors that didn’t exist when your org was purely UI-driven.
Prompt Injection Through Untrusted Inputs
PipeLeak works because Agentforce treats untrusted form data as part of its system context. An attacker submits a lead form with a hidden payload. The agent concatenates that input with its system instructions. The injected prompt overrides the agent’s original behavior. The agent then exfiltrates data to an attacker-controlled endpoint. Salesforce hasn’t issued a CVE for this yet, but the mechanics are clear. Any public-facing form that feeds data to an Agentforce agent is a potential injection point. The fix is input sanitization, guardrails, and treating all external input as untrusted regardless of the source.
How to Protect Your Org Right Now From an Experience Cloud Breach
These aren’t theoretical risks. They’re active attack patterns. Here’s what you need to do, in order of impact.
Audit Guest User Profiles on Every Experience Cloud Site
This is the single highest-impact step. If your guest user has access to CRM objects beyond what’s publicly intended, you’re exposed. Period.
Review API Acccess and External Integrations
Every connected app, every external endpoint, every API that doesn’t need to exist shouldn’t. Tighten authentication on what does.
Tighten Role Hierarchy and Permission Sets
Run a permission set review. Remove what’s stale. Lock down what’s too broad. Most orgs accumulate permissions over years without anyone asking if they’re still necessary.
Validate Digital Experience Security Settings
If you have customer portals, partner communities, or public-facing sites, audit the security configuration. Guest user profiles, sharing settings, and external data access are the usual suspects.
The Proactive Play: A Salesforce Security Assessment Stops Threats Before They Hit
Most organizations wait until a breach hits, a client asks, or leadership demands it before looking at their security posture. That’s a terrible time to discover your guest user profile has been granting full account access to anonymous visitors since 2022. A Salesforce Security Assessment gives you the picture before attackers do. We conduct a deep inspection of your org’s settings and present a comprehensive scorecard that ranks every area from Low to Critical risk. The assessment covers login and session settings, record sharing, user permissions, reports, digital experiences, and custom development. You get actionable findings and an executive readout so you know exactly where to focus your efforts.
True security is knowing what could go wrong before it does. And preventing it.
If you want to bulletproof your org before someone else tries to break in, let’s talk.
Frequently Asked Questions
What is the ShinyHunters Experience Cloud breach?
ShinyHunters is a cybercrime group targeting Salesforce customers through misconfigured Experience Cloud sites. They use automated tools to scan for guest user profiles with excessive permissions, allowing them to access sensitive CRM data without login credentials.
How do I secure my Experience Cloud guest user profile?
Review your guest user profile permissions in Setup. Remove access to sensitive objects like Accounts, Contacts, and Opportunities unless strictly necessary. Follow Salesforce’s recommended configuration guidance to limit what anonymous visitors can query.
What is PipeLeak in Salesforce Agentforce?
PipeLeak is a prompt injection vulnerability discovered by Capsule Security. It allows attackers to inject malicious instructions into untrusted lead capture forms. Agentforce agents then process these inputs as trusted prompts, potentially exfiltrating sensitive customer data to attacker-controlled endpoints.
How often should I audit my Salesforce org security?
At least annually, or immediately after major platform updates like Summer ’26 or TDX announcements. With the current wave of Experience Cloud exploits, a proactive security assessment is recommended to identify configuration gaps before attackers do.
What is a Salesforce Security Assessment?
A Salesforce Security Assessment is a comprehensive audit of your org’s security settings. It covers login settings, record sharing, user permissions, digital experiences, and custom development. The assessment provides a risk scorecard and actionable recommendations to strengthen your org’s defense against breaches.
Ready to Secure Your Org?
If you haven’t performed a security assessment in the last twelve months, it’s time to take action and protect your business and data.