Skip to main content

CVE-2025-4985: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes Project Portfolio Manager

High
VulnerabilityCVE-2025-4985cvecve-2025-4985cwe-79
Published: Fri May 30 2025 (05/30/2025, 14:19:28 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: Project Portfolio Manager

Description

A stored Cross-site Scripting (XSS) vulnerability affecting Risk Management in Project Portfolio Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:41:22 UTC

Technical Analysis

CVE-2025-4985 is a high-severity stored Cross-site Scripting (XSS) vulnerability identified in the Risk Management module of Dassault Systèmes' Project Portfolio Manager, specifically affecting versions from Release 3DEXPERIENCE R2022x Golden through R2025x Golden. This vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing malicious actors to inject and store arbitrary script code within the application. When a legitimate user accesses the affected page or module, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, unauthorized actions, or the delivery of further malware. The vulnerability requires low privileges (PR:L) but does require user interaction (UI:R), such as viewing the maliciously crafted content. The attack vector is network-based (AV:N), meaning exploitation can occur remotely without physical access. The vulnerability impacts confidentiality and integrity severely (C:H/I:H) but does not affect availability (A:N). The scope is changed (S:C), indicating that the vulnerability affects components beyond the initially vulnerable component, potentially impacting other parts of the system or user sessions. No known exploits are currently reported in the wild, but the high CVSS score of 8.7 underscores the criticality of timely remediation. The absence of published patches at this time necessitates proactive mitigation and monitoring. Given the nature of the product—used for project and risk management in enterprise environments—successful exploitation could compromise sensitive project data and user credentials, leading to broader organizational risks.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Dassault Systèmes' Project Portfolio Manager for managing critical projects and risk assessments. Exploitation could lead to unauthorized access to sensitive project information, manipulation of risk data, and potential lateral movement within corporate networks. Confidentiality breaches could expose intellectual property or strategic plans, while integrity violations could result in corrupted or falsified project data, undermining decision-making processes. The requirement for user interaction means that social engineering or phishing could be used to increase exploitation success. Given the widespread use of Dassault Systèmes products in European manufacturing, aerospace, automotive, and engineering sectors, the risk extends to critical infrastructure and high-value targets. Additionally, the cross-site scripting vulnerability could be leveraged to bypass access controls or escalate privileges within the application, amplifying the threat. The lack of known exploits currently provides a window for mitigation, but organizations should act swiftly to prevent potential future attacks.

Mitigation Recommendations

1. Immediate mitigation should include educating users about the risks of interacting with untrusted links or content within the Project Portfolio Manager environment to reduce the likelihood of successful exploitation. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. 3. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the affected modules. 4. Conduct thorough input validation and output encoding on all user-supplied data, especially within the Risk Management module, to prevent injection of malicious scripts. 5. Monitor application logs and user activity for unusual behavior indicative of exploitation attempts. 6. Coordinate with Dassault Systèmes for timely receipt and deployment of official patches once released. 7. Consider isolating or restricting access to the affected modules until patches are applied, particularly for high-risk user groups. 8. Regularly update and audit browser and endpoint security controls to detect and mitigate client-side attacks resulting from XSS. These measures go beyond generic advice by focusing on compensating controls and user awareness in the absence of immediate patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-05-20T07:30:17.476Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c097182aa0cae2b3b6a8

Added to database: 5/30/2025, 2:28:39 PM

Last enriched: 7/8/2025, 1:41:22 PM

Last updated: 7/30/2025, 4:11:09 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats