Skip to main content

CVE-2025-4989: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Dassault Systèmes Product Manager

High
VulnerabilityCVE-2025-4989cvecve-2025-4989cwe-79
Published: Fri May 30 2025 (05/30/2025, 14:19:03 UTC)
Source: CVE Database V5
Vendor/Project: Dassault Systèmes
Product: Product Manager

Description

A stored Cross-site Scripting (XSS) vulnerability affecting Requirements in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session.

AI-Powered Analysis

AILast updated: 07/08/2025, 13:42:08 UTC

Technical Analysis

CVE-2025-4989 is a high-severity stored Cross-site Scripting (XSS) vulnerability identified in Dassault Systèmes' Product Manager component within the 3DEXPERIENCE platform, specifically affecting releases from R2022x through R2025x Golden versions. The vulnerability stems from improper neutralization of input during web page generation (CWE-79), allowing malicious actors to inject and store arbitrary script code within the 'Requirements' feature of the Product Manager. When a legitimate user accesses the affected page or feature, the malicious script executes within their browser context. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the user, or further exploitation of the user's environment. The CVSS v3.1 base score is 8.7, indicating a high severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N) reveals that the attack can be performed remotely over the network with low attack complexity, requires low privileges but does require user interaction (such as clicking a link or opening a page). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact on confidentiality and integrity is high, though availability is not affected. No known exploits are currently reported in the wild, and no patches are linked yet, indicating the vulnerability is newly disclosed and may require urgent attention. The vulnerability is significant because Product Manager is used for managing product requirements in engineering and manufacturing workflows, making it a critical asset in organizations relying on Dassault Systèmes' 3DEXPERIENCE platform.

Potential Impact

For European organizations, especially those in aerospace, automotive, industrial machinery, and other advanced manufacturing sectors where Dassault Systèmes' 3DEXPERIENCE platform is widely adopted, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive intellectual property, manipulation of product requirements, and potential sabotage of engineering data integrity. The high confidentiality and integrity impact could result in leakage of proprietary designs or alteration of critical product specifications, which can have downstream effects on product safety and compliance. Additionally, attackers could leverage the XSS flaw to perform phishing or social engineering attacks within the corporate environment, compromising user credentials or gaining further foothold. Given the collaborative nature of the platform, a successful attack could propagate through interconnected systems and users, amplifying the damage. The lack of availability impact reduces the risk of service downtime but does not diminish the threat to data security and trustworthiness of product lifecycle management processes.

Mitigation Recommendations

Organizations should immediately review their deployment of Dassault Systèmes Product Manager within the 3DEXPERIENCE platform and apply any available vendor patches or updates as soon as they are released. In the absence of patches, implement strict input validation and output encoding on the 'Requirements' fields to neutralize potentially malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Enhance user awareness and training to recognize suspicious links or unexpected behaviors within the platform. Restrict access privileges to the minimum necessary, especially limiting write permissions to the Requirements feature to trusted users. Monitor logs and user activity for unusual patterns indicative of exploitation attempts. Consider deploying web application firewalls (WAF) with rules targeting XSS payloads specific to the platform. Coordinate with Dassault Systèmes support for guidance and to receive timely updates on patches or workarounds.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
3DS
Date Reserved
2025-05-20T07:30:35.632Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c097182aa0cae2b3b6ae

Added to database: 5/30/2025, 2:28:39 PM

Last enriched: 7/8/2025, 1:42:08 PM

Last updated: 7/31/2025, 10:42:21 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats