Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10554: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes ENOVIA Product Manager

0
High
VulnerabilityCVE-2025-10554cvecve-2025-10554cwe-79
Published: Mon Nov 24 2025 (11/24/2025, 15:31:39 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: ENOVIA Product Manager

Description

A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in ENOVIA Product Manager from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

AI-Powered Analysis

AILast updated: 12/01/2025, 15:47:18 UTC

Technical Analysis

CVE-2025-10554 is a stored Cross-site Scripting (XSS) vulnerability identified in Dassault Systèmes ENOVIA Product Manager, specifically impacting the Requirements feature across releases 3DEXPERIENCE R2023x, R2024x, and R2025x. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), allowing malicious script code to be stored and later executed in the browsers of users who access the compromised content. The attack vector is network-based with low attack complexity, requiring the attacker to have some privileges (PR:L) and user interaction (UI:R) to succeed. The vulnerability affects confidentiality and integrity severely (C:H/I:H) but does not affect availability (A:N). The scope is changed (S:C), meaning the vulnerability can impact resources beyond the attacker’s privileges. An attacker can inject malicious JavaScript into the Requirements module, which when viewed by other users, executes in their browser context, potentially leading to session hijacking, credential theft, unauthorized actions, or data exfiltration. Although no public exploits are reported yet, the high CVSS score (8.7) reflects the significant risk posed by this vulnerability. The vulnerability is particularly critical in environments where ENOVIA Product Manager is used for sensitive product lifecycle management and collaboration, as it could compromise intellectual property and sensitive project data. The vulnerability was reserved on 2025-09-16 and published on 2025-11-24, with no patch links currently available, indicating that organizations should monitor for vendor updates and apply them promptly once released.

Potential Impact

For European organizations, especially those in manufacturing, aerospace, automotive, and engineering sectors that rely on Dassault Systèmes ENOVIA Product Manager for product lifecycle management, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive design and requirements data, manipulation of product specifications, and compromise of user sessions. This could result in intellectual property theft, disruption of collaborative workflows, and potential regulatory compliance issues under GDPR due to data breaches. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, as insider threats or social engineering could facilitate exploitation. The impact on confidentiality and integrity is high, potentially undermining trust in critical engineering processes and causing financial and reputational damage. Additionally, the cross-site scripting nature of the vulnerability could be leveraged as a foothold for further attacks within the corporate network.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Monitor Dassault Systèmes communications and apply security patches immediately upon release to address CVE-2025-10554. 2) Implement strict input validation and output encoding on all user-supplied data within ENOVIA, particularly in the Requirements module, to prevent script injection. 3) Enforce the principle of least privilege by restricting user permissions to only those necessary for their role, minimizing the potential for malicious input. 4) Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 5) Educate users on the risks of interacting with untrusted content and implement multi-factor authentication to reduce the risk of compromised credentials. 6) Enhance monitoring and logging of user activities within ENOVIA to detect anomalous behavior indicative of exploitation attempts. 7) Consider network segmentation and web application firewalls (WAF) with rules tailored to detect and block XSS payloads targeting ENOVIA. These steps collectively reduce the likelihood and impact of exploitation beyond generic patching advice.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
3DS
Date Reserved
2025-09-16T12:56:39.296Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69247cb8efc7406fa668b292

Added to database: 11/24/2025, 3:41:44 PM

Last enriched: 12/1/2025, 3:47:18 PM

Last updated: 1/8/2026, 8:14:36 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats