07/14/2025 | Press release | Distributed by Public on 07/14/2025 15:10
When it comes to protecting sensitive data, most people think about encryption, access controls, and login security. But one of the simplest ways sensitive information can be unintentionally exposed, or leaked, is also one of the most overlooked: putting sensitive data in a URL.
In Salesforce, that could mean exposing user details, session info, or other private data any time someone clicks a link, loads a resource, or shares a page. The risk is easy to miss-but also easy to fix, once you understand how it works.
Sensitive data is anything that could harm your users or your business if it were exposed. In Salesforce, common examples include:
If you're unsure, ask yourself: Would I be comfortable seeing this data in a public browser history, or shared with an external website?
When a user clicks a link or when their webpage loads an image or script, their browser may automatically send part of the current page's URL as the referrer to the next website.
If a URL contains sensitive information-whether in a query string (after the ?) or, less commonly, embedded directly in the URL itself (for example, ftp://user:pass@host)-that data can be exposed to:
Most users (and even some developers) don't realize this sharing happens by default with some customizations or integrations.
By default, Salesforce keeps sensitive data out of URLs. But issues can arise when customizations or integrations pass data through query strings or route parameters. Examples of scenarios where this might happen are:
These shortcuts might seem harmless during development but if left unchecked, can introduce long-term security risks.
Educate your users, protect your Salesforce org, and encourage a culture of security.
Security Basics
Master Salesforce security basics.
When sensitive data ends up in a URL, it's hard to control where it goes next. If an external site or service captures that URL:
Beyond the technical risks, this erodes the trust your users place in your Salesforce apps.
✔️ Review your Salesforce apps and integrations for sensitive data in URLs.
✔️ Enable the referrer-policy HTTP header in your org.
✔️ Share this best practice with your teams-because the best protection is prevention.
Security is a shared responsibility-and it starts with the small things. Review your org today and make sure sensitive data stays where it belongs.
Protect Sensitive Information in Your URLs (Help Article)
Salesforce Security Basics (Trailhead Module)
The more we build with security in mind, the stronger we make our entire ecosystem.
Laura engages with customers, partners and the security industry to drive awareness and adoption of security best practices. She has worked in the security industry for more than 10 years and is extremely passionate about helping people keep their valuable PII and data secure. Currently, Laura runs...Read More Salesforce's external security awareness programs and educates customers on how to secure their Salesforce orgs.
More by Laura