Beta

Report

Dynamics 365 Integration <= 1.3.23 is vulnerable to Authenticated (Contributor+) Remote Code Execution and Arbitrary File Read via Twig Server-Side Template Injection vulnerability

Contributor
Published
2025-01-02

The Dynamics 365 Integration plugin for WordPress is vulnerable to Remote Code Execution and Arbitrary File Read in all versions up to, and including, 1.3.23 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.

CVSS

Score:9.9

Severity:Critical

Version: 1.3.23

There is a patch available in v1.3.24 and we strongly recommend you update to this version as soon as possible.