CVE-2025-62211: Dynamics 365 Field Service (online) Spoofing Vulnerability

Overview

Severity
High (CVSS 8.7)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
Category
Spoofing
Exploit Status
Not Exploited
Exploitation Likelihood
Unlikely
Patch Tuesday
2025-Nov
Released
2025-11-11
EPSS Score
0.04% (percentile: 11.3%)

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

FAQ

According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious link and convince the user to open it. What actions do customers need to take to protect themselves from this vulnerability? Customers running Dynamics 365 Field Service (online) need to go to the Power Platform admin center and apply the updates. See Update apps and solutions for more information about updating your Field Service app. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.

Affected Products (1)

Microsoft Dynamics

  • Dynamics 365 Field Service (online)

Acknowledgments

<a href="https://x.com/nmdhkr">Brad Schlintz (nmdhkr)</a>

Revision History

  • 2025-11-11: Information published.