Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0725: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cyberlord92 Integrate Dynamics 365 CRM

0
Medium
VulnerabilityCVE-2026-0725cvecve-2026-0725cwe-79
Published: Sat Jan 17 2026 (01/17/2026, 08:24:31 UTC)
Source: CVE Database V5
Vendor/Project: cyberlord92
Product: Integrate Dynamics 365 CRM

Description

The Integrate Dynamics 365 CRM plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:50:24 UTC

Technical Analysis

CVE-2026-0725 identifies a stored Cross-Site Scripting (XSS) vulnerability in the Integrate Dynamics 365 CRM plugin for WordPress, developed by cyberlord92. This vulnerability exists in all versions up to and including 1.1.1 due to insufficient sanitization and output escaping of user-supplied input in the plugin’s administrative settings. Specifically, authenticated users with Administrator-level privileges can inject arbitrary JavaScript code into the plugin’s pages. When other users, including administrators or CRM users, access these pages, the injected scripts execute in their browsers. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed with the victim’s privileges. The vulnerability requires high privileges (administrator access) and does not require user interaction to trigger once the malicious script is stored. The CVSS 3.1 score is 4.4 (medium), reflecting network attack vector, high attack complexity, required privileges, no user interaction, and limited confidentiality and integrity impact without availability impact. No public exploits have been reported yet, but the risk remains due to the plugin’s integration with Microsoft Dynamics 365 CRM, which is widely used in enterprise environments. The vulnerability’s scope is significant because it affects the confidentiality and integrity of CRM data and potentially the broader WordPress environment hosting the plugin. The lack of patches at the time of reporting increases the urgency for mitigation.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of CRM data managed through Dynamics 365 integrated with WordPress. Attackers with administrator access could inject malicious scripts that compromise user sessions or manipulate CRM data, potentially leading to data breaches or unauthorized data modification. Given the widespread use of WordPress and Dynamics 365 CRM in Europe, especially in sectors like finance, manufacturing, and public administration, exploitation could disrupt business operations and damage trust. The vulnerability could also facilitate lateral movement within networks if attackers leverage compromised admin sessions. Although exploitation requires administrator privileges, insider threats or compromised admin accounts increase risk. The medium CVSS score suggests moderate impact, but the strategic importance of CRM data elevates the potential business impact. Countries with high Dynamics 365 adoption and active WordPress ecosystems are particularly vulnerable, making this a relevant concern for European enterprises relying on these technologies.

Mitigation Recommendations

European organizations should immediately audit and restrict administrator access to the Integrate Dynamics 365 CRM plugin within WordPress, ensuring only trusted personnel have such privileges. Implement strict input validation and output encoding on all admin-configurable fields to prevent script injection. Monitor administrative activity logs for unusual changes or suspicious behavior indicative of attempted exploitation. Where possible, isolate the WordPress instance hosting the plugin from critical internal networks to limit lateral movement. Employ Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the plugin’s admin pages. Regularly update the plugin once a patch is released by the vendor. Until a patch is available, consider disabling the plugin or limiting its use to reduce exposure. Conduct user awareness training for administrators on the risks of XSS and safe plugin management practices. Finally, perform regular security assessments and penetration tests focusing on WordPress plugins integrated with enterprise systems like Dynamics 365.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-08T13:46:37.754Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b47c6d302b072d9dc16f5

Added to database: 1/17/2026, 8:26:46 AM

Last enriched: 1/24/2026, 7:50:24 PM

Last updated: 2/7/2026, 5:17:16 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats