Executive Summary
In November 2025, Salesforce detected unauthorized activity involving Gainsight-published applications integrated via OAuth tokens with the Salesforce platform. The breach potentially enabled attackers to access sensitive customer data by compromising OAuth connections between select third-party Gainsight apps and Salesforce tenant environments. Upon discovery, Salesforce revoked all active access and refresh tokens for affected integrations, initiated incident response protocols, and notified impacted customers. The unauthorized access appears limited to data accessible via the compromised tokens, but the full scope is still under investigation.
This incident is significant as it demonstrates the inherent risks of third-party SaaS integrations and OAuth-based supply chain connections. As organizations increasingly leverage cloud-based ecosystems, attackers are targeting indirect trust relationships, exposing data via the weakest link. Enterprises face mounting regulatory, contractual, and operational risks from such supply chain attacks.
Why This Matters Now
Supply chain attacks leveraging OAuth integrations are on the rise, targeting trusted third-party applications to bypass direct security controls. Organizations relying on SaaS ecosystems must proactively assess and manage the risks of indirect access, particularly as attackers exploit vulnerable app permissions and integration misconfigurations.
Attack Path Analysis
The attack began with the compromise of a third-party Gainsight app connected via OAuth to Salesforce, enabling adversaries to obtain unauthorized access tokens. Attackers leveraged these tokens to escalate privileges and interact with customer data. From there, the threat actor likely moved laterally between accessible data sets within the Salesforce environment. They maintained command and control through persistent cloud access channels, potentially by refreshing stolen tokens. Sensitive Salesforce data was exfiltrated through authorized but malicious API calls. The primary impact was unauthorized exposure and potential loss of customer data.
Kill Chain Progression
Initial Compromise
Description
Attackers exploited the OAuth trust relationship with a Gainsight-published app, allowing initial access to connected Salesforce accounts.
MITRE ATT&CK® Techniques
Trusted Relationship
Valid Accounts: Cloud Accounts
Use Alternate Authentication Material: Application Access Token
Brute Force: Password Spraying
Account Discovery: Cloud Account
Data from Cloud Storage Object
Exfiltration Over Web Service: Exfiltration to Cloud Storage
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Authentication and Access to System Components
Control ID: 8.1.4
NYDFS 23 NYCRR 500 – Monitoring and Access Controls
Control ID: 500.14(b)
DORA – ICT Third-Party Risk Management
Control ID: Article 10
CISA Zero Trust Maturity Model 2.0 – Federation, Single Sign-On, and Third-Party Integrations
Control ID: Identity Pillar: Governance
NIS2 Directive – Operational Security – Supply Chain Security
Control ID: Article 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Computer Software/Engineering
Supply chain compromise through Salesforce-Gainsight OAuth connections threatens SaaS platforms, requiring enhanced zero trust segmentation and multicloud visibility controls.
Financial Services
Unauthorized Salesforce data access via third-party applications creates compliance violations requiring egress security controls and threat detection capabilities.
Health Care / Life Sciences
OAuth-based data breaches in CRM systems expose patient data, demanding encrypted traffic protection and anomaly detection per HIPAA requirements.
Professional Training
Customer relationship management compromises through supply chain attacks threaten training platforms using Salesforce integrations for client data management.
Sources
- Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activityhttps://thehackernews.com/2025/11/salesforce-flags-unauthorized-data.htmlVerified
- Salesforce says some of its customers' data was accessed after Gainsight breachhttps://techcrunch.com/2025/11/20/salesforce-says-some-of-its-customers-data-was-accessed-after-gainsight-breach/Verified
- Salesforce Cuts Off Gainsight App Access After Detecting Data Exposure Risk—Mandiant Launches Investigationhttps://www.benzinga.com/markets/tech/25/11/48996753/salesforce-cuts-off-gainsight-app-access-after-detecting-data-exposure-risk-mandiant-launches-investigation/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust Segmentation, east-west traffic security, continuous anomaly detection, and strict egress policy enforcement would have substantially reduced the attack surface and mitigated data exfiltration. Granular policy and workload isolation across multi-cloud and SaaS boundaries prevent broad exploitation from third-party supply chain vulnerabilities.
Control: Zero Trust Segmentation
Mitigation: Isolates SaaS integrations and limits initial blast radius.
Control: Multicloud Visibility & Control
Mitigation: Detects and audits privilege anomalies in app communications.
Control: East-West Traffic Security
Mitigation: Blocks unauthorized workload-to-workload access.
Control: Threat Detection & Anomaly Response
Mitigation: Alerts on unusual API behavior and session patterns.
Control: Egress Security & Policy Enforcement
Mitigation: Prevents sensitive data flow to unsanctioned destinations.
Accelerates containment and limits operational disruption.
Impact at a Glance
Affected Business Functions
- Customer Relationship Management
- Sales Operations
- Customer Support
Estimated downtime: 3 days
Estimated loss: $500,000
Unauthorized access to certain customers' Salesforce data through compromised OAuth tokens associated with Gainsight-published applications. Specific data types exposed may include customer contact information, sales records, and support case details.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust Segmentation for all third-party SaaS integrations to minimize blast radius from supply chain compromises.
- • Implement continuous egress monitoring and FQDN filtering for all sensitive data flows, especially between SaaS platforms.
- • Baseline and alert on abnormal privilege escalations and API call patterns through robust Threat Detection & Anomaly Response controls.
- • Enhance visibility and auditability across multi-cloud and SaaS service meshes to rapidly detect and contain anomalous behavior.
- • Periodically reassess OAuth scopes and application permissions, revoking unnecessary or over-privileged access wherever possible.



