Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-36031: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

0
High
VulnerabilityCVE-2023-36031cvecve-2023-36031cwe-79
Published: Tue Nov 14 2023 (11/14/2023, 17:57:36 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

AI-Powered Analysis

AILast updated: 10/09/2025, 00:20:37 UTC

Technical Analysis

CVE-2023-36031 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting Microsoft Dynamics 365 (on-premises) version 9.1 and earlier 9.0 versions. The vulnerability stems from improper neutralization of user-supplied input during web page generation, which allows an attacker with authenticated access and low privileges to inject malicious scripts. These scripts execute in the context of other users, potentially leading to unauthorized disclosure of sensitive information (confidentiality impact rated high), partial integrity compromise, and no impact on availability. The CVSS 3.1 base score is 7.6, reflecting network attack vector, low attack complexity, required privileges, and user interaction. The scope is changed, indicating that the vulnerability affects resources beyond the initially vulnerable component. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the widespread use of Dynamics 365 in enterprise environments. Attackers could leverage this flaw to steal session tokens, perform actions on behalf of users, or conduct phishing campaigns within the affected environment. The vulnerability is particularly concerning for on-premises deployments where patching cycles may be slower than cloud services. The lack of immediate patches requires organizations to implement compensating controls to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2023-36031 can be substantial, especially in sectors relying heavily on Microsoft Dynamics 365 for customer relationship management, finance, and operations. Confidentiality breaches could expose sensitive customer data, intellectual property, or internal communications, leading to regulatory penalties under GDPR. Partial integrity loss could allow attackers to manipulate displayed data or user actions, undermining trust and operational accuracy. Although availability is not directly affected, the indirect consequences of data leakage and trust erosion can disrupt business continuity. Organizations with on-premises deployments face increased risk due to potentially delayed patch application compared to cloud-hosted services. The vulnerability also raises concerns for entities targeted by advanced persistent threats (APTs) seeking to exploit trusted internal systems for espionage or sabotage. Given the requirement for authenticated access and user interaction, insider threats or social engineering attacks could facilitate exploitation.

Mitigation Recommendations

To mitigate CVE-2023-36031, European organizations should prioritize the following actions: 1) Monitor Microsoft’s security advisories closely and apply official patches or updates as soon as they become available. 2) Restrict user privileges to the minimum necessary, limiting the number of users who can input data that is rendered in web pages. 3) Implement strict input validation and output encoding on all user-supplied data within Dynamics 365 customizations or integrations to prevent script injection. 4) Deploy and configure web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting Dynamics 365 endpoints. 5) Conduct regular security awareness training to reduce the risk of social engineering and phishing that could facilitate exploitation. 6) Review and harden authentication mechanisms, including multi-factor authentication, to reduce the risk of compromised credentials. 7) Perform periodic security assessments and penetration testing focused on web application vulnerabilities within Dynamics 365 environments. 8) Isolate critical Dynamics 365 instances within segmented network zones to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-06-20T20:44:39.825Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee4aa

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 10/9/2025, 12:20:37 AM

Last updated: 12/4/2025, 5:56:53 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats