Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12956: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes ENOVIA Collaborative Industry Innovator

0
High
VulnerabilityCVE-2025-12956cvecve-2025-12956cwe-79
Published: Mon Dec 08 2025 (12/08/2025, 08:38:45 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: ENOVIA Collaborative Industry Innovator

Description

A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

AI-Powered Analysis

AILast updated: 12/08/2025, 09:13:38 UTC

Technical Analysis

CVE-2025-12956 is a reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Dassault Systèmes ENOVIA Collaborative Industry Innovator across multiple releases from 3DEXPERIENCE R2022x to R2025x. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, allowing malicious script code to be injected and executed in the context of a victim user's browser session. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and limited privileges (PR:L), with user interaction necessary (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). Exploitation could lead to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim user. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for organizations relying on ENOVIA for collaborative product lifecycle management. The vulnerability is particularly concerning in environments where sensitive intellectual property and design data are handled. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.

Potential Impact

For European organizations, especially those in manufacturing, aerospace, automotive, and industrial design sectors that utilize ENOVIA Collaborative Industry Innovator, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive design data, intellectual property theft, and compromise of user credentials, potentially enabling further lateral movement within corporate networks. The reflected XSS can also facilitate phishing attacks or malware delivery by injecting malicious scripts into trusted web sessions. Given the collaborative nature of ENOVIA, a successful attack could disrupt workflows and damage business reputation. The high confidentiality and integrity impact could result in significant financial losses and regulatory compliance issues under GDPR if personal or sensitive data is exposed. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with high user activity and potential social engineering vectors.

Mitigation Recommendations

Organizations should prioritize applying official patches from Dassault Systèmes once they become available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct regular security awareness training to educate users about the risks of clicking on suspicious links or interacting with untrusted content. Monitor web application logs and network traffic for unusual patterns indicative of XSS exploitation attempts. Employ web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting ENOVIA endpoints. Review and minimize user privileges within ENOVIA to limit the potential damage from compromised accounts. Finally, ensure that incident response plans include procedures for handling web application attacks and data breaches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
3DS
Date Reserved
2025-11-10T15:22:00.527Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69369326ddfbd9e35f933086

Added to database: 12/8/2025, 8:58:14 AM

Last enriched: 12/8/2025, 9:13:38 AM

Last updated: 2/7/2026, 8:39:27 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats