CVE-2025-12956: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes ENOVIA Collaborative Industry Innovator
A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
AI Analysis
Technical Summary
CVE-2025-12956 is a reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Dassault Systèmes ENOVIA Collaborative Industry Innovator across multiple releases from 3DEXPERIENCE R2022x to R2025x. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, allowing malicious script code to be injected and executed in the context of a victim user's browser session. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and limited privileges (PR:L), with user interaction necessary (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). Exploitation could lead to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim user. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for organizations relying on ENOVIA for collaborative product lifecycle management. The vulnerability is particularly concerning in environments where sensitive intellectual property and design data are handled. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, especially those in manufacturing, aerospace, automotive, and industrial design sectors that utilize ENOVIA Collaborative Industry Innovator, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive design data, intellectual property theft, and compromise of user credentials, potentially enabling further lateral movement within corporate networks. The reflected XSS can also facilitate phishing attacks or malware delivery by injecting malicious scripts into trusted web sessions. Given the collaborative nature of ENOVIA, a successful attack could disrupt workflows and damage business reputation. The high confidentiality and integrity impact could result in significant financial losses and regulatory compliance issues under GDPR if personal or sensitive data is exposed. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with high user activity and potential social engineering vectors.
Mitigation Recommendations
Organizations should prioritize applying official patches from Dassault Systèmes once they become available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct regular security awareness training to educate users about the risks of clicking on suspicious links or interacting with untrusted content. Monitor web application logs and network traffic for unusual patterns indicative of XSS exploitation attempts. Employ web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting ENOVIA endpoints. Review and minimize user privileges within ENOVIA to limit the potential damage from compromised accounts. Finally, ensure that incident response plans include procedures for handling web application attacks and data breaches related to this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Spain, Netherlands, Sweden
CVE-2025-12956: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes ENOVIA Collaborative Industry Innovator
Description
A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.
AI-Powered Analysis
Technical Analysis
CVE-2025-12956 is a reflected Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Dassault Systèmes ENOVIA Collaborative Industry Innovator across multiple releases from 3DEXPERIENCE R2022x to R2025x. This vulnerability arises due to improper neutralization of user-supplied input during web page generation, allowing malicious script code to be injected and executed in the context of a victim user's browser session. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and limited privileges (PR:L), with user interaction necessary (UI:R). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the vulnerable component. The impact on confidentiality and integrity is high (C:H/I:H), while availability is not affected (A:N). Exploitation could lead to session hijacking, theft of sensitive data, or unauthorized actions performed on behalf of the victim user. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for organizations relying on ENOVIA for collaborative product lifecycle management. The vulnerability is particularly concerning in environments where sensitive intellectual property and design data are handled. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce exposure.
Potential Impact
For European organizations, especially those in manufacturing, aerospace, automotive, and industrial design sectors that utilize ENOVIA Collaborative Industry Innovator, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive design data, intellectual property theft, and compromise of user credentials, potentially enabling further lateral movement within corporate networks. The reflected XSS can also facilitate phishing attacks or malware delivery by injecting malicious scripts into trusted web sessions. Given the collaborative nature of ENOVIA, a successful attack could disrupt workflows and damage business reputation. The high confidentiality and integrity impact could result in significant financial losses and regulatory compliance issues under GDPR if personal or sensitive data is exposed. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with high user activity and potential social engineering vectors.
Mitigation Recommendations
Organizations should prioritize applying official patches from Dassault Systèmes once they become available. In the interim, implement strict input validation and output encoding on all user-supplied data to prevent script injection. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct regular security awareness training to educate users about the risks of clicking on suspicious links or interacting with untrusted content. Monitor web application logs and network traffic for unusual patterns indicative of XSS exploitation attempts. Employ web application firewalls (WAFs) with rules tailored to detect and block reflected XSS payloads targeting ENOVIA endpoints. Review and minimize user privileges within ENOVIA to limit the potential damage from compromised accounts. Finally, ensure that incident response plans include procedures for handling web application attacks and data breaches related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- 3DS
- Date Reserved
- 2025-11-10T15:22:00.527Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69369326ddfbd9e35f933086
Added to database: 12/8/2025, 8:58:14 AM
Last enriched: 12/8/2025, 9:13:38 AM
Last updated: 2/7/2026, 9:18:28 PM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.