Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49745: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Dynamics 365 (on-premises) version 9.1

0
Medium
VulnerabilityCVE-2025-49745cvecve-2025-49745cwe-79
Published: Tue Aug 12 2025 (08/12/2025, 17:09:42 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Microsoft Dynamics 365 (on-premises) version 9.1

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

AILast updated: 11/14/2025, 06:26:55 UTC

Technical Analysis

CVE-2025-49745 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in Microsoft Dynamics 365 (on-premises) version 9.1. The vulnerability stems from improper neutralization of user-supplied input during the generation of web pages within the application. This flaw enables an attacker to inject malicious scripts that execute in the context of the victim's browser, potentially allowing spoofing attacks such as session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is exploitable remotely over a network without requiring authentication, but it does require user interaction, such as clicking a maliciously crafted link or visiting a compromised webpage. The CVSS v3.1 score is 5.4 (medium severity), reflecting low complexity of attack and limited impact on confidentiality and integrity, with no impact on availability. No known public exploits or patches are currently available, indicating the need for proactive defensive measures. The vulnerability affects Microsoft Dynamics 365 on-premises version 9.1 and earlier versions like 9.0, which are widely used in enterprise environments for customer relationship management and business process automation. Given the critical role of Dynamics 365 in managing sensitive business data, exploitation could lead to unauthorized data disclosure or manipulation, undermining trust and compliance with data protection regulations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality and integrity of sensitive business and customer data managed within Microsoft Dynamics 365. Successful exploitation could allow attackers to perform spoofing attacks, potentially leading to session hijacking, unauthorized data access, or manipulation of business records. This could result in financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The impact is heightened for sectors relying heavily on Dynamics 365 for critical operations, such as finance, healthcare, manufacturing, and public administration. Since the vulnerability requires user interaction, phishing campaigns could be a likely attack vector, increasing the risk of targeted social engineering attacks. The lack of current patches means organizations must rely on interim mitigations, increasing operational overhead and risk exposure. Additionally, the on-premises deployment model means that organizations are responsible for timely patch management and security controls, which may vary across European entities.

Mitigation Recommendations

To mitigate CVE-2025-49745, European organizations should implement the following specific measures: 1) Enforce strict input validation and output encoding within customizations or extensions of Dynamics 365 to prevent injection of malicious scripts. 2) Apply web application firewalls (WAFs) with rules designed to detect and block XSS attack patterns targeting Dynamics 365 endpoints. 3) Educate users about phishing and social engineering risks, emphasizing caution with unsolicited links and emails. 4) Restrict browser scripting capabilities where feasible using Content Security Policy (CSP) headers to limit script execution sources. 5) Monitor logs and network traffic for anomalous activities indicative of attempted XSS exploitation. 6) Prepare for rapid deployment of official patches from Microsoft once released by maintaining an up-to-date asset inventory and patch management process. 7) Limit user privileges within Dynamics 365 to the minimum necessary to reduce the impact of potential exploitation. 8) Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. These targeted actions go beyond generic advice by addressing the specific nature of the vulnerability and the operational context of Dynamics 365 on-premises deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-06-09T22:49:37.619Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689b774aad5a09ad0034910d

Added to database: 8/12/2025, 5:18:02 PM

Last enriched: 11/14/2025, 6:26:55 AM

Last updated: 12/3/2025, 3:11:42 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats