Skip to main content

CVE-2025-4986: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes Product Manager

High
VulnerabilityCVE-2025-4986cvecve-2025-4986cwe-79
Published: Fri May 30 2025 (05/30/2025, 14:19:21 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: Product Manager

Description

A stored Cross-site Scripting (XSS) vulnerability affecting Model Definition in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:41:39 UTC

Technical Analysis

CVE-2025-4986 is a high-severity stored Cross-site Scripting (XSS) vulnerability identified in the Product Manager component of Dassault Systèmes' 3DEXPERIENCE platform, specifically affecting versions from Release 3DEXPERIENCE R2022x Golden through R2025x Golden. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79), allowing malicious actors to inject and store arbitrary script code within the Model Definition feature. When a legitimate user accesses the affected page, the malicious script executes within their browser context. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the user, or the delivery of further malware. The vulnerability requires low privileges (PR:L) but does require user interaction (UI:R), such as viewing the compromised page. The attack vector is network-based (AV:N), meaning exploitation can be attempted remotely without physical access. The scope is changed (S:C), indicating that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the system or user sessions. The CVSS v3.1 base score is 8.7, reflecting high impact on confidentiality and integrity, with no impact on availability. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting that mitigation and remediation efforts should be prioritized by affected organizations. Given the nature of the vulnerability, attackers could leverage it to compromise user accounts and gain unauthorized access to sensitive design and product data managed within the 3DEXPERIENCE platform, which is widely used in engineering, manufacturing, and product lifecycle management environments.

Potential Impact

For European organizations, the impact of CVE-2025-4986 can be significant, especially those in sectors relying heavily on Dassault Systèmes' 3DEXPERIENCE platform, such as automotive, aerospace, industrial machinery, and high-tech manufacturing. Exploitation could lead to unauthorized disclosure of intellectual property, design schematics, and sensitive project data, undermining competitive advantage and potentially violating data protection regulations like GDPR if personal data is involved. The integrity of product data could be compromised, leading to flawed designs or manufacturing errors with downstream safety and compliance implications. Additionally, session hijacking or credential theft could facilitate lateral movement within corporate networks, increasing the risk of broader compromise. The requirement for user interaction means that phishing or social engineering could be used to lure users to maliciously crafted pages, increasing the risk profile. The lack of current public exploits provides a window for proactive defense, but the high CVSS score and changed scope indicate that the vulnerability could have widespread consequences if weaponized.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and monitor all instances of the 3DEXPERIENCE Product Manager for unusual script activity or unexpected user behavior indicative of XSS exploitation attempts. 2) Apply strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the Model Definition feature. 4) Educate users on the risks of interacting with untrusted links or content within the platform to reduce the likelihood of successful social engineering. 5) Coordinate with Dassault Systèmes for timely patch deployment once available, and test patches in controlled environments before production rollout. 6) Implement input validation and output encoding best practices in any custom integrations or extensions to the Product Manager to prevent injection of malicious scripts. 7) Regularly review and update user privileges to minimize the number of users with modification rights that could be exploited to inject malicious content. 8) Conduct penetration testing focused on XSS vectors within the 3DEXPERIENCE environment to identify and remediate any additional weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-05-20T07:30:22.581Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c097182aa0cae2b3b6aa

Added to database: 5/30/2025, 2:28:39 PM

Last enriched: 7/8/2025, 1:41:39 PM

Last updated: 8/12/2025, 12:50:44 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats