Improper control of generation of code ('code injection') in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.
Loading...
Loading...
Score 9.9 from GitHub Security Advisory (severity: CRITICAL) published 2026-05-12. NVD baseline CVSS 9.9; sources differ by 0.0.
Improper control of generation of code ('code injection') in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.
May 12, 2026
May 14, 2026
Security Update Guide - Microsoft Security Response Center. Patch available via Microsoft Security Update
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898These vendors published their own advisory mentioning this CVE — often with vendor-specific remediation steps + affected product lists not in NVD.
See which npm, PyPI, Go, and Maven packages are affected by CVE-2026-42898
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.