Description
The Dynamics 365 Integration plugin for WordPress is vulnerable to Remote Code Execution and Arbitrary File Read in all versions up to, and including, 1.3.23 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Exploits (1)
References (3)
Scores
CVSS v3
9.9
EPSS
0.0914
EPSS Percentile
92.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Lab Environment
Details
CWE
CWE-1336
Status
published
Products (1)
alexacrm/Dynamics 365 Integration
< 1.3.23
Published
Jan 04, 2025
Tracked Since
Feb 18, 2026