Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM

0
Medium
VulnerabilityCVE-2026-0725cvecve-2026-0725cwe-79
Published: Sat Jan 17 2026 (01/17/2026, 08:24:31 UTC)
Source: CVE Database V5
Vendor/Project: cyberlord92
Product: Integrate Dynamics 365 CRM

Description

CVE-2026-0725 is a stored Cross-Site Scripting (XSS) vulnerability in the Integrate Dynamics 365 CRM WordPress plugin by cyberlord92, affecting all versions up to 1. 1. 1. It arises from improper input sanitization and output escaping in admin settings, allowing authenticated administrators to inject malicious scripts. These scripts execute whenever a user accesses the compromised page, potentially leading to session hijacking or privilege escalation. The vulnerability requires administrator-level privileges and does not need user interaction to exploit. The CVSS score is 4. 4 (medium severity), reflecting the need for high privileges and the limited impact scope. European organizations using this plugin in their WordPress environments, especially those integrating Dynamics 365 CRM, should prioritize patching or mitigating this issue. Countries with significant Microsoft Dynamics 365 and WordPress usage, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 01/17/2026, 08:41:23 UTC

Technical Analysis

CVE-2026-0725 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Integrate Dynamics 365 CRM plugin for WordPress, developed by cyberlord92. This vulnerability affects all versions up to and including 1.1.1. The root cause is insufficient sanitization and escaping of user-supplied input within the plugin’s administrative settings interface. Specifically, authenticated users with Administrator-level privileges or higher can inject arbitrary JavaScript code into the plugin’s configuration pages. When any user subsequently accesses a page containing the injected script, the malicious code executes in their browser context. This can lead to various attacks such as session hijacking, unauthorized actions performed on behalf of users, or the theft of sensitive information. The vulnerability requires high privileges (administrator access) to exploit and does not require any user interaction beyond visiting the affected page. The CVSS v3.1 base score is 4.4, indicating medium severity, with the vector reflecting network attack vector, high attack complexity, high privileges required, no user interaction, and partial confidentiality and integrity impact. No public exploits or patches have been reported at the time of publication. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS. This vulnerability is particularly relevant for organizations using WordPress sites integrated with Microsoft Dynamics 365 CRM via this plugin, as it could compromise administrative interfaces and user sessions.

Potential Impact

For European organizations, the impact of CVE-2026-0725 can be significant in environments where the Integrate Dynamics 365 CRM plugin is deployed on WordPress sites. Exploitation allows attackers with administrator privileges to inject malicious scripts that execute in the context of any user visiting the compromised pages, potentially leading to session hijacking, unauthorized actions, or data leakage. This can undermine the confidentiality and integrity of sensitive customer relationship management data and administrative controls. Given the integration with Dynamics 365 CRM, which often contains critical business and customer data, the risk extends to business operations and compliance with data protection regulations such as GDPR. Although the vulnerability requires administrator-level access, insider threats or compromised admin accounts could be leveraged to exploit this flaw. The medium CVSS score reflects the limited scope of impact due to the privilege requirement but does not diminish the potential damage in targeted attacks. European organizations relying on this plugin for CRM integration should consider the risk of reputational damage, regulatory penalties, and operational disruption if exploited.

Mitigation Recommendations

1. Immediately restrict administrative access to the WordPress environment hosting the Integrate Dynamics 365 CRM plugin to trusted personnel only, enforcing strong authentication mechanisms such as multi-factor authentication (MFA). 2. Monitor administrative activities and audit logs for suspicious behavior indicative of attempted or successful script injection. 3. Apply strict input validation and output encoding controls in the plugin’s admin settings, if possible, by customizing or patching the plugin code to sanitize user inputs properly. 4. If a vendor patch becomes available, prioritize timely deployment to remediate the vulnerability. 5. Consider isolating the WordPress instance or limiting access to the plugin’s administrative pages via network segmentation or web application firewalls (WAF) with rules to detect and block XSS payloads. 6. Educate administrators on the risks of XSS and the importance of secure configuration management. 7. Regularly update WordPress core, plugins, and themes to reduce exposure to similar vulnerabilities. 8. Conduct penetration testing and vulnerability scanning focused on administrative interfaces to detect injection flaws proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T13:46:37.754Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b47c6d302b072d9dc16f5

Added to database: 1/17/2026, 8:26:46 AM

Last enriched: 1/17/2026, 8:41:23 AM

Last updated: 1/17/2026, 11:19:53 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats