CVE-2023-36007: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Send Customer Voice survey from Dynamics 365 app
Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
AI Analysis
Technical Summary
CVE-2023-36007 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Microsoft Send Customer Voice survey component of the Dynamics 365 app, specifically version 1.0.0.0. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious input to be rendered without adequate sanitization. This flaw enables an authenticated user with low privileges to inject malicious scripts that execute in the context of other users who view the survey, potentially leading to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. The CVSS v3.1 score of 7.6 reflects a high severity due to the network attack vector, low attack complexity, and the requirement for low privileges and user interaction. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially compromised component, increasing its impact. While no public exploits have been reported yet, the vulnerability's nature and the widespread use of Dynamics 365 in enterprise environments make it a significant concern. The vulnerability does not affect availability but has a high impact on confidentiality and a limited impact on integrity. The absence of a patch at the time of publication necessitates immediate mitigation efforts by organizations relying on this component.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business and customer data collected via Dynamics 365 Customer Voice surveys. Attackers exploiting this XSS flaw could hijack user sessions, steal authentication tokens, or perform actions on behalf of legitimate users, potentially leading to data breaches or unauthorized access to internal systems. Given the integration of Dynamics 365 with other Microsoft services and enterprise workflows, exploitation could cascade into broader compromise scenarios. The impact is particularly critical for sectors handling sensitive personal data, such as finance, healthcare, and public administration, which are heavily regulated under GDPR. Additionally, reputational damage and regulatory penalties could arise from exploitation. The requirement for user interaction and low privileges lowers the barrier for exploitation within organizations, increasing the likelihood of successful attacks if mitigations are not applied promptly.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely for the release of official patches addressing CVE-2023-36007 and apply them immediately upon availability. 2. Until patches are available, restrict access to the Send Customer Voice survey feature to trusted and essential users only, minimizing exposure. 3. Implement strict input validation and output encoding on all user-supplied data within the survey application to prevent malicious script injection. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the survey. 5. Educate users to recognize and report suspicious behavior or unexpected prompts when interacting with surveys. 6. Review and harden authentication and session management controls to mitigate session hijacking risks. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities within Dynamics 365 environments. 8. Consider network-level controls such as web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting the survey component.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2023-36007: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Send Customer Voice survey from Dynamics 365 app
Description
Microsoft Send Customer Voice survey from Dynamics 365 Spoofing Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36007 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Microsoft Send Customer Voice survey component of the Dynamics 365 app, specifically version 1.0.0.0. The vulnerability arises from improper neutralization of input during web page generation, allowing malicious input to be rendered without adequate sanitization. This flaw enables an authenticated user with low privileges to inject malicious scripts that execute in the context of other users who view the survey, potentially leading to session hijacking, data theft, or unauthorized actions performed on behalf of the victim. The CVSS v3.1 score of 7.6 reflects a high severity due to the network attack vector, low attack complexity, and the requirement for low privileges and user interaction. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially compromised component, increasing its impact. While no public exploits have been reported yet, the vulnerability's nature and the widespread use of Dynamics 365 in enterprise environments make it a significant concern. The vulnerability does not affect availability but has a high impact on confidentiality and a limited impact on integrity. The absence of a patch at the time of publication necessitates immediate mitigation efforts by organizations relying on this component.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive business and customer data collected via Dynamics 365 Customer Voice surveys. Attackers exploiting this XSS flaw could hijack user sessions, steal authentication tokens, or perform actions on behalf of legitimate users, potentially leading to data breaches or unauthorized access to internal systems. Given the integration of Dynamics 365 with other Microsoft services and enterprise workflows, exploitation could cascade into broader compromise scenarios. The impact is particularly critical for sectors handling sensitive personal data, such as finance, healthcare, and public administration, which are heavily regulated under GDPR. Additionally, reputational damage and regulatory penalties could arise from exploitation. The requirement for user interaction and low privileges lowers the barrier for exploitation within organizations, increasing the likelihood of successful attacks if mitigations are not applied promptly.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely for the release of official patches addressing CVE-2023-36007 and apply them immediately upon availability. 2. Until patches are available, restrict access to the Send Customer Voice survey feature to trusted and essential users only, minimizing exposure. 3. Implement strict input validation and output encoding on all user-supplied data within the survey application to prevent malicious script injection. 4. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the survey. 5. Educate users to recognize and report suspicious behavior or unexpected prompts when interacting with surveys. 6. Review and harden authentication and session management controls to mitigate session hijacking risks. 7. Conduct regular security assessments and penetration testing focused on web application vulnerabilities within Dynamics 365 environments. 8. Consider network-level controls such as web application firewalls (WAF) with custom rules to detect and block XSS payloads targeting the survey component.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-20T20:44:39.822Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee417
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 10/9/2025, 12:16:26 AM
Last updated: 12/4/2025, 3:22:44 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.