CVE-2025-10551: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dassault Systèmes ENOVIA Collaborative Industry Innovator
CVE-2025-10551 is a high-severity stored Cross-site Scripting (XSS) vulnerability in Dassault Systèmes ENOVIA Collaborative Industry Innovator affecting document management functionality in releases from 3DEXPERIENCE R2023x through R2025x. The flaw allows an attacker with limited privileges and requiring user interaction to inject malicious scripts that execute in the context of other users' browsers, potentially leading to credential theft, session hijacking, or unauthorized actions. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires an authenticated user to interact with malicious content, and the vulnerability has a CVSS 3. 1 score of 8. 7, indicating a high risk. No public exploits are currently known. Organizations using affected ENOVIA versions should prioritize patching once available and implement strict input validation and content security policies to mitigate risk. Countries with significant ENOVIA deployments in aerospace, automotive, and manufacturing sectors are most at risk, including the United States, France, Germany, Japan, South Korea, and China.
AI Analysis
Technical Summary
CVE-2025-10551 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects the Document Management component of Dassault Systèmes ENOVIA Collaborative Industry Innovator. This vulnerability exists in releases from 3DEXPERIENCE R2023x Golden through R2025x Golden. The flaw arises due to improper neutralization of input during web page generation, allowing malicious script code to be stored and later executed in the browsers of users who access the compromised content. An attacker with at least limited privileges (PR:L) can craft and store malicious input that, when rendered, executes arbitrary JavaScript in the context of the victim's session. The attack requires user interaction (UI:R), such as clicking a link or opening a document, and can compromise confidentiality and integrity by stealing session tokens, performing unauthorized actions, or exfiltrating sensitive data. The CVSS v3.1 base score is 8.7, reflecting network attack vector (AV:N), low attack complexity (AC:L), and scope change (S:C). No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of ENOVIA in critical industries. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
The impact of CVE-2025-10551 is substantial for organizations using ENOVIA Collaborative Industry Innovator in managing sensitive documents and collaborative workflows. Successful exploitation can lead to theft of user credentials, session hijacking, unauthorized data access, and manipulation of business-critical information. This can result in intellectual property theft, disruption of product development cycles, and damage to corporate reputation. Since ENOVIA is widely used in aerospace, automotive, manufacturing, and other high-value sectors, the compromise of these systems could have cascading effects on supply chains and national security interests. The vulnerability does not directly affect system availability but severely undermines confidentiality and integrity, potentially enabling further attacks or insider threats. Organizations lacking robust monitoring and input validation controls are particularly vulnerable to exploitation.
Mitigation Recommendations
To mitigate CVE-2025-10551, organizations should implement the following specific measures: 1) Monitor Dassault Systèmes advisories closely and apply official patches or updates immediately upon release. 2) Enforce strict input validation and output encoding on all user-supplied data within ENOVIA, especially in document management modules, to prevent malicious script injection. 3) Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Conduct regular security training for users to recognize and avoid interacting with suspicious links or documents. 5) Implement multi-factor authentication (MFA) to reduce the impact of credential theft. 6) Use web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting ENOVIA endpoints. 7) Audit and limit user privileges to the minimum necessary to reduce the attack surface. 8) Employ continuous monitoring and logging to detect anomalous activities indicative of exploitation attempts. These targeted actions will help reduce the risk until patches are deployed.
Affected Countries
United States, France, Germany, Japan, South Korea, China, Italy, United Kingdom, Canada, India
CVE-2025-10551: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Dassault Systèmes ENOVIA Collaborative Industry Innovator
Description
CVE-2025-10551 is a high-severity stored Cross-site Scripting (XSS) vulnerability in Dassault Systèmes ENOVIA Collaborative Industry Innovator affecting document management functionality in releases from 3DEXPERIENCE R2023x through R2025x. The flaw allows an attacker with limited privileges and requiring user interaction to inject malicious scripts that execute in the context of other users' browsers, potentially leading to credential theft, session hijacking, or unauthorized actions. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires an authenticated user to interact with malicious content, and the vulnerability has a CVSS 3. 1 score of 8. 7, indicating a high risk. No public exploits are currently known. Organizations using affected ENOVIA versions should prioritize patching once available and implement strict input validation and content security policies to mitigate risk. Countries with significant ENOVIA deployments in aerospace, automotive, and manufacturing sectors are most at risk, including the United States, France, Germany, Japan, South Korea, and China.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-10551 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects the Document Management component of Dassault Systèmes ENOVIA Collaborative Industry Innovator. This vulnerability exists in releases from 3DEXPERIENCE R2023x Golden through R2025x Golden. The flaw arises due to improper neutralization of input during web page generation, allowing malicious script code to be stored and later executed in the browsers of users who access the compromised content. An attacker with at least limited privileges (PR:L) can craft and store malicious input that, when rendered, executes arbitrary JavaScript in the context of the victim's session. The attack requires user interaction (UI:R), such as clicking a link or opening a document, and can compromise confidentiality and integrity by stealing session tokens, performing unauthorized actions, or exfiltrating sensitive data. The CVSS v3.1 base score is 8.7, reflecting network attack vector (AV:N), low attack complexity (AC:L), and scope change (S:C). No public exploits have been reported yet, but the vulnerability poses a significant risk due to the widespread use of ENOVIA in critical industries. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
The impact of CVE-2025-10551 is substantial for organizations using ENOVIA Collaborative Industry Innovator in managing sensitive documents and collaborative workflows. Successful exploitation can lead to theft of user credentials, session hijacking, unauthorized data access, and manipulation of business-critical information. This can result in intellectual property theft, disruption of product development cycles, and damage to corporate reputation. Since ENOVIA is widely used in aerospace, automotive, manufacturing, and other high-value sectors, the compromise of these systems could have cascading effects on supply chains and national security interests. The vulnerability does not directly affect system availability but severely undermines confidentiality and integrity, potentially enabling further attacks or insider threats. Organizations lacking robust monitoring and input validation controls are particularly vulnerable to exploitation.
Mitigation Recommendations
To mitigate CVE-2025-10551, organizations should implement the following specific measures: 1) Monitor Dassault Systèmes advisories closely and apply official patches or updates immediately upon release. 2) Enforce strict input validation and output encoding on all user-supplied data within ENOVIA, especially in document management modules, to prevent malicious script injection. 3) Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 4) Conduct regular security training for users to recognize and avoid interacting with suspicious links or documents. 5) Implement multi-factor authentication (MFA) to reduce the impact of credential theft. 6) Use web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting ENOVIA endpoints. 7) Audit and limit user privileges to the minimum necessary to reduce the attack surface. 8) Employ continuous monitoring and logging to detect anomalous activities indicative of exploitation attempts. These targeted actions will help reduce the risk until patches are deployed.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2025-09-16T12:56:32.752Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cb8b7de6bfc5ba1df48222
Added to database: 3/31/2026, 8:53:17 AM
Last enriched: 3/31/2026, 9:08:42 AM
Last updated: 3/31/2026, 10:16:11 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.