CVE-2025-0595

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in 3DDashboard within 3DSwymer allows attackers to inject malicious scripts that execute in users' browsers when viewing affected dashboard content. This affects all 3DEXPERIENCE deployments from R2022x through R2024x, potentially compromising user sessions and data.

💻 Affected Systems

Products:
  • 3DSwymer
  • 3DDashboard
  • 3DEXPERIENCE Platform
Versions: 3DEXPERIENCE R2022x through R2024x
Operating Systems: All platforms running 3DEXPERIENCE
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments within the affected version range are vulnerable unless specifically patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, redirect users to malicious sites, perform actions as authenticated users, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking leading to unauthorized access, data theft, or manipulation of dashboard content visible to other users.

🟢

If Mitigated

Limited to content manipulation within the dashboard interface if proper input validation and output encoding are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to inject malicious content into the dashboard, which typically requires some level of access or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version beyond 3DEXPERIENCE R2024x or specific security update from Dassault Systèmes

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: No

Instructions:

1. Check current 3DEXPERIENCE version. 2. Apply the latest security update from Dassault Systèmes. 3. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement strict input validation and proper output encoding for all user-controllable dashboard content.

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution sources.
  • Disable or restrict dashboard editing capabilities for untrusted users.

🔍 How to Verify

Check if Vulnerable:

Check 3DEXPERIENCE version against affected range (R2022x through R2024x).

Check Version:

Check 3DEXPERIENCE administration console or contact Dassault Systèmes support for version information.

Verify Fix Applied:

Verify the installation of the latest security update from Dassault Systèmes and test XSS payloads in dashboard fields.

📡 Detection & Monitoring

Log Indicators:

  • Unusual dashboard content modifications
  • Suspicious script tags or JavaScript in dashboard data

Network Indicators:

  • Unexpected external script loads from dashboard pages
  • Suspicious outbound connections following dashboard access

SIEM Query:

Search for patterns like '<script>', 'javascript:', or encoded payloads in dashboard access logs.

🔗 References

📤 Share & Export