CVE-2025-10554: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes ENOVIA Product Manager
A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in ENOVIA Product Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
AI Analysis
Technical Summary
CVE-2025-10554 is a stored Cross-site Scripting (XSS) vulnerability categorized under CWE-79, affecting Dassault Systèmes ENOVIA Product Manager in the 3DEXPERIENCE platform releases R2023x through R2025x. The vulnerability arises from improper neutralization of input during web page generation within the Requirements module, allowing an attacker to inject malicious JavaScript code that is stored persistently and executed in the browsers of other users who view the affected content. Exploitation requires the attacker to have at least limited privileges (PR:L) and user interaction (UI:R), such as convincing a user to open a crafted Requirements page. The vulnerability impacts confidentiality and integrity severely by enabling session hijacking, credential theft, and unauthorized actions performed under the victim's session. The CVSS v3.1 base score is 8.7 (high), reflecting network attack vector, low attack complexity, required privileges, user interaction, and scope change. No public exploits are known yet, but the vulnerability's presence in widely used ENOVIA Product Manager versions makes it a significant risk. The lack of available patches at the time of publication necessitates immediate defensive measures. ENOVIA is widely used in industries requiring collaborative product lifecycle management (PLM), making this vulnerability particularly critical for organizations relying on secure engineering workflows.
Potential Impact
For European organizations, the impact of CVE-2025-10554 is substantial. ENOVIA Product Manager is commonly deployed in aerospace, automotive, industrial manufacturing, and engineering sectors prevalent in Europe. Successful exploitation can lead to unauthorized disclosure of sensitive design and product data, manipulation of requirements documents, and potential disruption of product development processes. This can cause intellectual property theft, regulatory compliance violations (e.g., GDPR due to data leakage), and reputational damage. The vulnerability's ability to compromise user sessions can facilitate lateral movement within corporate networks, increasing the risk of broader intrusions. Given the collaborative nature of ENOVIA, multiple users and departments may be affected simultaneously, amplifying operational impact. European companies engaged in critical infrastructure or defense-related manufacturing are particularly at risk due to the strategic importance of their data and the high value of their intellectual property.
Mitigation Recommendations
To mitigate CVE-2025-10554 effectively, European organizations should: 1) Immediately apply any official patches or updates released by Dassault Systèmes once available. 2) Implement strict input validation and output encoding on all user-supplied data within ENOVIA, especially in the Requirements module, to prevent script injection. 3) Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Limit user privileges to the minimum necessary, reducing the risk posed by compromised accounts. 5) Educate users about the risks of interacting with untrusted content and encourage cautious behavior regarding links and attachments. 6) Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting ENOVIA. 8) Conduct regular security assessments and penetration testing focused on web application vulnerabilities within PLM systems. 9) Isolate ENOVIA environments where possible to limit exposure and lateral movement. 10) Maintain incident response readiness to quickly contain and remediate any detected exploitation.
Affected Countries
France, Germany, Italy, United Kingdom, Spain, Netherlands, Belgium, Sweden
CVE-2025-10554: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes ENOVIA Product Manager
Description
A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in ENOVIA Product Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
AI-Powered Analysis
Technical Analysis
CVE-2025-10554 is a stored Cross-site Scripting (XSS) vulnerability categorized under CWE-79, affecting Dassault Systèmes ENOVIA Product Manager in the 3DEXPERIENCE platform releases R2023x through R2025x. The vulnerability arises from improper neutralization of input during web page generation within the Requirements module, allowing an attacker to inject malicious JavaScript code that is stored persistently and executed in the browsers of other users who view the affected content. Exploitation requires the attacker to have at least limited privileges (PR:L) and user interaction (UI:R), such as convincing a user to open a crafted Requirements page. The vulnerability impacts confidentiality and integrity severely by enabling session hijacking, credential theft, and unauthorized actions performed under the victim's session. The CVSS v3.1 base score is 8.7 (high), reflecting network attack vector, low attack complexity, required privileges, user interaction, and scope change. No public exploits are known yet, but the vulnerability's presence in widely used ENOVIA Product Manager versions makes it a significant risk. The lack of available patches at the time of publication necessitates immediate defensive measures. ENOVIA is widely used in industries requiring collaborative product lifecycle management (PLM), making this vulnerability particularly critical for organizations relying on secure engineering workflows.
Potential Impact
For European organizations, the impact of CVE-2025-10554 is substantial. ENOVIA Product Manager is commonly deployed in aerospace, automotive, industrial manufacturing, and engineering sectors prevalent in Europe. Successful exploitation can lead to unauthorized disclosure of sensitive design and product data, manipulation of requirements documents, and potential disruption of product development processes. This can cause intellectual property theft, regulatory compliance violations (e.g., GDPR due to data leakage), and reputational damage. The vulnerability's ability to compromise user sessions can facilitate lateral movement within corporate networks, increasing the risk of broader intrusions. Given the collaborative nature of ENOVIA, multiple users and departments may be affected simultaneously, amplifying operational impact. European companies engaged in critical infrastructure or defense-related manufacturing are particularly at risk due to the strategic importance of their data and the high value of their intellectual property.
Mitigation Recommendations
To mitigate CVE-2025-10554 effectively, European organizations should: 1) Immediately apply any official patches or updates released by Dassault Systèmes once available. 2) Implement strict input validation and output encoding on all user-supplied data within ENOVIA, especially in the Requirements module, to prevent script injection. 3) Enforce Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 4) Limit user privileges to the minimum necessary, reducing the risk posed by compromised accounts. 5) Educate users about the risks of interacting with untrusted content and encourage cautious behavior regarding links and attachments. 6) Monitor application logs and network traffic for unusual activity indicative of exploitation attempts. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block XSS payloads targeting ENOVIA. 8) Conduct regular security assessments and penetration testing focused on web application vulnerabilities within PLM systems. 9) Isolate ENOVIA environments where possible to limit exposure and lateral movement. 10) Maintain incident response readiness to quickly contain and remediate any detected exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2025-09-16T12:56:39.296Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69247cb8efc7406fa668b292
Added to database: 11/24/2025, 3:41:44 PM
Last enriched: 11/24/2025, 3:43:41 PM
Last updated: 11/24/2025, 5:43:53 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63435: n/a
MediumCVE-2025-63434: n/a
CriticalCVE-2025-63433: n/a
HighCVE-2025-63432: n/a
HighConflicts between URL mapping and URL based access control., (Mon, Nov 24th)
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.