Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36007: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Send Customer Voice survey from Dynamics 365 app

0
High
VulnerabilityCVE-2023-36007cvecve-2023-36007cwe-79
Published: Tue Nov 14 2023 (11/14/2023, 20:17:50 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Send Customer Voice survey from Dynamics 365 app

Description

Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:16:26 UTC

Technical Analysis

CVE-2023-36007 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Microsoft Send Customer Voice survey component of the Dynamics 365 app, specifically version 1.0.0.0. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious input to be rendered without adequate sanitization. This flaw enables an authenticated user with low privileges to inject malicious scripts that execute in the context of other users who view the survey, potentially leading to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. The CVSS v3.1 score of 7.6 reflects a high severity due to the network attack vector, low attack complexity, and the requirement for low privileges and user interaction. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially compromised component, increasing its impact. While no public exploits have been reported yet, the vulnerability's nature and the widespread use of Dynamics 365 in enterprise environments make it a significant concern. The vulnerability does not affect availability but has a high impact on confidentiality and a limited impact on integrity. The absence of a patch at the time of publication necessitates immediate mitigation efforts by organizations relying on this component.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business and customer data collected via Dynamics 365 Customer Voice surveys. Attackers exploiting this XSS flaw could hijack user sessions, steal authentication tokens, or perform actions on behalf of legitimate users, potentially leading to data breaches or unauthorized access to internal systems. Given the integration of Dynamics 365 with other Microsoft services and enterprise workflows, exploitation could cascade into broader compromise scenarios. The impact is particularly critical for sectors handling sensitive personal data, such as finance, healthcare, and public administration, which are heavily regulated under GDPR. Additionally, reputational damage and regulatory penalties could arise from exploitation. The requirement for user interaction and low privileges lowers the barrier for exploitation within organizations, increasing the likelihood of successful attacks if mitigations are not applied promptly.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely for the release of official patches addressing CVE-2023-36007 and apply them immediately upon availability. 2. Until patches are available, restrict access to the Send Customer Voice survey feature to trusted and essential users only, minimizing exposure. 3. Implement strict input validation and output encoding on all user-supplied data within the survey application to prevent malicious script injection. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the survey. 5. Educate users to recognize and report suspicious behavior or unexpected prompts when interacting with surveys. 6. Review and harden authentication and session management controls to mitigate session hijacking risks. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities within Dynamics 365 environments. 8. Consider network-level controls such as web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting the survey component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-20T20:44:39.822Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee417

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 10/9/2025, 12:16:26 AM

Last updated: 12/4/2025, 3:22:44 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats