CVE-2025-49745: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.
AI Analysis
Technical Summary
CVE-2025-49745 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects Microsoft Dynamics 365 (on-premises) version 9.1, including affected versions starting from 9.0. The vulnerability stems from improper neutralization of user-supplied input during web page generation, which allows an attacker to inject malicious scripts into web pages viewed by other users. This flaw enables unauthorized attackers to perform spoofing attacks over a network, potentially tricking users into executing malicious actions or disclosing sensitive information. The vulnerability does not require any privileges or authentication to exploit, but it does require user interaction, such as clicking a crafted link or visiting a malicious webpage. The CVSS v3.1 base score is 5.4, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact affects confidentiality and integrity by potentially exposing sensitive data or allowing spoofing but does not affect system availability. No public exploits or patches have been reported or released yet, but the vulnerability is officially published and reserved by Microsoft as of August 2025. Given the widespread use of Microsoft Dynamics 365 in enterprise environments, especially in Europe, this vulnerability poses a significant risk to organizations relying on on-premises deployments for customer relationship management and business operations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive business information and enable attackers to impersonate legitimate users or services within Microsoft Dynamics 365 environments. This can facilitate phishing, social engineering, or further exploitation of internal systems. The impact is particularly critical for sectors handling sensitive customer data, such as finance, healthcare, and government agencies. Since the vulnerability requires user interaction, the risk is heightened in environments where users may be less aware of social engineering tactics. The integrity of data and trustworthiness of communications within Dynamics 365 could be compromised, potentially leading to financial loss, reputational damage, and regulatory non-compliance under GDPR. However, as availability is not affected, operational disruptions are less likely. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially once exploit code becomes available.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply official patches or updates for Dynamics 365 (on-premises) version 9.1 as soon as they are released. 2. Implement strict input validation and output encoding on all user-supplied data within customizations or integrations to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in Dynamics 365 web pages. 4. Educate users on recognizing phishing attempts and suspicious links, emphasizing caution when interacting with unexpected emails or messages. 5. Use web application firewalls (WAFs) with rules tuned to detect and block XSS attack patterns targeting Dynamics 365 interfaces. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in Dynamics 365 deployments. 7. Limit user permissions and roles within Dynamics 365 to the minimum necessary to reduce the potential impact of successful attacks. 8. Review and harden any custom plugins, scripts, or third-party integrations that interact with Dynamics 365 to ensure they do not introduce additional XSS risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-49745: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1
Description
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.
AI-Powered Analysis
Technical Analysis
CVE-2025-49745 is a cross-site scripting (XSS) vulnerability classified under CWE-79 that affects Microsoft Dynamics 365 (on-premises) version 9.1, including affected versions starting from 9.0. The vulnerability stems from improper neutralization of user-supplied input during web page generation, which allows an attacker to inject malicious scripts into web pages viewed by other users. This flaw enables unauthorized attackers to perform spoofing attacks over a network, potentially tricking users into executing malicious actions or disclosing sensitive information. The vulnerability does not require any privileges or authentication to exploit, but it does require user interaction, such as clicking a crafted link or visiting a malicious webpage. The CVSS v3.1 base score is 5.4, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C. This means the attack can be launched remotely over the network with low attack complexity, no privileges required, but user interaction is necessary. The impact affects confidentiality and integrity by potentially exposing sensitive data or allowing spoofing but does not affect system availability. No public exploits or patches have been reported or released yet, but the vulnerability is officially published and reserved by Microsoft as of August 2025. Given the widespread use of Microsoft Dynamics 365 in enterprise environments, especially in Europe, this vulnerability poses a significant risk to organizations relying on on-premises deployments for customer relationship management and business operations.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive business information and enable attackers to impersonate legitimate users or services within Microsoft Dynamics 365 environments. This can facilitate phishing, social engineering, or further exploitation of internal systems. The impact is particularly critical for sectors handling sensitive customer data, such as finance, healthcare, and government agencies. Since the vulnerability requires user interaction, the risk is heightened in environments where users may be less aware of social engineering tactics. The integrity of data and trustworthiness of communications within Dynamics 365 could be compromised, potentially leading to financial loss, reputational damage, and regulatory non-compliance under GDPR. However, as availability is not affected, operational disruptions are less likely. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially once exploit code becomes available.
Mitigation Recommendations
1. Monitor Microsoft security advisories closely and apply official patches or updates for Dynamics 365 (on-premises) version 9.1 as soon as they are released. 2. Implement strict input validation and output encoding on all user-supplied data within customizations or integrations to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in Dynamics 365 web pages. 4. Educate users on recognizing phishing attempts and suspicious links, emphasizing caution when interacting with unexpected emails or messages. 5. Use web application firewalls (WAFs) with rules tuned to detect and block XSS attack patterns targeting Dynamics 365 interfaces. 6. Conduct regular security assessments and penetration testing focused on web application vulnerabilities in Dynamics 365 deployments. 7. Limit user permissions and roles within Dynamics 365 to the minimum necessary to reduce the potential impact of successful attacks. 8. Review and harden any custom plugins, scripts, or third-party integrations that interact with Dynamics 365 to ensure they do not introduce additional XSS risks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2025-06-09T22:49:37.619Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 689b774aad5a09ad0034910d
Added to database: 8/12/2025, 5:18:02 PM
Last enriched: 10/15/2025, 5:19:56 PM
Last updated: 10/16/2025, 7:25:52 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61553: n/a
UnknownCVE-2025-11853: Improper Access Controls in Sismics Teedy
MediumCVE-2025-11852: Missing Authentication in Apeman ID71
MediumCVE-2025-11493: CWE-494 Download of Code Without Integrity Check in ConnectWise Automate
HighCVE-2025-11492: CWE-319 Cleartext Transmission of Sensitive Information in ConnectWise Automate
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.