CVE-2025-49745: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-49745 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in Microsoft Dynamics 365 (on-premises) version 9.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages within the application. This flaw enables an attacker to inject malicious scripts that execute in the context of the victim's browser, potentially allowing spoofing attacks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over a network without requiring authentication, but it does require user interaction, such as clicking a maliciously crafted link or visiting a compromised webpage. The CVSS v3.1 score is 5.4 (medium severity), reflecting low complexity of attack and limited impact on confidentiality and integrity, with no impact on availability. No known public exploits or patches are currently available, indicating the need for proactive defensive measures. The vulnerability affects Microsoft Dynamics 365 on-premises version 9.1 and earlier versions like 9.0, which are widely used in enterprise environments for customer relationship management and business process automation. Given the critical role of Dynamics 365 in managing sensitive business data, exploitation could lead to unauthorized data disclosure or manipulation, undermining trust and compliance with data protection regulations.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of sensitive business and customer data managed within Microsoft Dynamics 365. Successful exploitation could allow attackers to perform spoofing attacks, potentially leading to session hijacking, unauthorized data access, or manipulation of business records. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The impact is heightened for sectors relying heavily on Dynamics 365 for critical operations, such as finance, healthcare, manufacturing, and public administration. Since the vulnerability requires user interaction, phishing campaigns could be a likely attack vector, increasing the risk of targeted social engineering attacks. The lack of current patches means organizations must rely on interim mitigations, increasing operational overhead and risk exposure. Additionally, the on-premises deployment model means that organizations are responsible for timely patch management and security controls, which may vary across European entities.
Mitigation Recommendations
To mitigate CVE-2025-49745, European organizations should implement the following specific measures: 1) Enforce strict input validation and output encoding within customizations or extensions of Dynamics 365 to prevent injection of malicious scripts. 2) Apply web application firewalls (WAFs) with rules designed to detect and block XSS attack patterns targeting Dynamics 365 endpoints. 3) Educate users about phishing and social engineering risks, emphasizing caution with unsolicited links and emails. 4) Restrict browser scripting capabilities where feasible using Content Security Policy (CSP) headers to limit script execution sources. 5) Monitor logs and network traffic for anomalous activities indicative of attempted XSS exploitation. 6) Prepare for rapid deployment of official patches from Microsoft once released by maintaining an up-to-date asset inventory and patch management process. 7) Limit user privileges within Dynamics 365 to the minimum necessary to reduce the impact of potential exploitation. 8) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. These targeted actions go beyond generic advice by addressing the specific nature of the vulnerability and the operational context of Dynamics 365 on-premises deployments.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-49745: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1
Description
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-49745 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in Microsoft Dynamics 365 (on-premises) version 9.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages within the application. This flaw enables an attacker to inject malicious scripts that execute in the context of the victim's browser, potentially allowing spoofing attacks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over a network without requiring authentication, but it does require user interaction, such as clicking a maliciously crafted link or visiting a compromised webpage. The CVSS v3.1 score is 5.4 (medium severity), reflecting low complexity of attack and limited impact on confidentiality and integrity, with no impact on availability. No known public exploits or patches are currently available, indicating the need for proactive defensive measures. The vulnerability affects Microsoft Dynamics 365 on-premises version 9.1 and earlier versions like 9.0, which are widely used in enterprise environments for customer relationship management and business process automation. Given the critical role of Dynamics 365 in managing sensitive business data, exploitation could lead to unauthorized data disclosure or manipulation, undermining trust and compliance with data protection regulations.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of sensitive business and customer data managed within Microsoft Dynamics 365. Successful exploitation could allow attackers to perform spoofing attacks, potentially leading to session hijacking, unauthorized data access, or manipulation of business records. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The impact is heightened for sectors relying heavily on Dynamics 365 for critical operations, such as finance, healthcare, manufacturing, and public administration. Since the vulnerability requires user interaction, phishing campaigns could be a likely attack vector, increasing the risk of targeted social engineering attacks. The lack of current patches means organizations must rely on interim mitigations, increasing operational overhead and risk exposure. Additionally, the on-premises deployment model means that organizations are responsible for timely patch management and security controls, which may vary across European entities.
Mitigation Recommendations
To mitigate CVE-2025-49745, European organizations should implement the following specific measures: 1) Enforce strict input validation and output encoding within customizations or extensions of Dynamics 365 to prevent injection of malicious scripts. 2) Apply web application firewalls (WAFs) with rules designed to detect and block XSS attack patterns targeting Dynamics 365 endpoints. 3) Educate users about phishing and social engineering risks, emphasizing caution with unsolicited links and emails. 4) Restrict browser scripting capabilities where feasible using Content Security Policy (CSP) headers to limit script execution sources. 5) Monitor logs and network traffic for anomalous activities indicative of attempted XSS exploitation. 6) Prepare for rapid deployment of official patches from Microsoft once released by maintaining an up-to-date asset inventory and patch management process. 7) Limit user privileges within Dynamics 365 to the minimum necessary to reduce the impact of potential exploitation. 8) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. These targeted actions go beyond generic advice by addressing the specific nature of the vulnerability and the operational context of Dynamics 365 on-premises deployments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T22:49:37.619Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689b774aad5a09ad0034910d
Added to database: 8/12/2025, 5:18:02 PM
Last enriched: 11/14/2025, 6:26:55 AM
Last updated: 12/3/2025, 3:11:42 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13646: CWE-434 Unrestricted Upload of File with Dangerous Type in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13645: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in wpchill Image Gallery – Photo Grid & Video Gallery
HighCVE-2025-13448: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in anastis CSSIgniter Shortcodes
MediumCVE-2025-55181: Excessive Iteration (CWE-834) in Facebook proxygen
MediumCVE-2025-64778: CWE-798 Use of Hard-coded Credentials in Mirion Medical EC2 Software NMIS BioDose
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.