Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 19 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Thu, 19 Mar 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft dynamics 365 Customer Service |
|
| Vendors & Products |
Microsoft
Microsoft dynamics 365 Customer Service |
Wed, 18 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Microsoft Dynamics 365 Customer Engagement (on-premises) 1612 (9.0.2.3034) allows the generation of customized reports via raw SQL queries in an upload of a .rdl (Report Definition Language) file; this is then processed by the SQL Server Reporting Service. An account with the privilege Add Reporting Services Reports can upload a malicious rdl file. If the malicious rdl file is already loaded and it is executable by the user, the Add Reporting Services Reports privilege is not required. A malicious actor can trigger the generation of the report, causing the execution of arbitrary SQL commands in the underlying database. Depending on the permissions of the account running SQL Server Reporting Services, the attacker may be able to perform additional actions, such as accessing linked servers or executing operating system commands. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-19T14:42:28.552Z
Reserved: 2025-08-25T00:00:00.000Z
Link: CVE-2025-58112
Updated: 2026-03-19T14:42:18.634Z
Status : Awaiting Analysis
Published: 2026-03-18T19:16:03.497
Modified: 2026-03-19T15:16:20.657
Link: CVE-2025-58112
No data.
OpenCVE Enrichment
Updated: 2026-03-19T08:56:55Z