CVE-2025-0596

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator's Bookmark Editor allows attackers to inject malicious scripts that execute in users' browsers when viewing manipulated bookmarks. This affects all users of ENOVIA Collaborative Industry Innovator on Release 3DEXPERIENCE R2024x who have access to the Bookmark Editor functionality.

💻 Affected Systems

Products:
  • ENOVIA Collaborative Industry Innovator
Versions: Release 3DEXPERIENCE R2024x
Operating Systems: Not OS-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to Bookmark Editor functionality; exploitation depends on user interaction with malicious bookmarks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking leading to unauthorized access, data theft, or manipulation of user-specific settings and data.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to create/modify bookmarks; stored XSS triggers when other users view the malicious bookmark.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patch version

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: No

Instructions:

1. Review the vendor advisory at the provided URL. 2. Apply the recommended patch or update to a fixed version. 3. Test the Bookmark Editor functionality post-patch.

🔧 Temporary Workarounds

Implement Content Security Policy (CSP)

all

Restrict script execution sources to prevent XSS payloads from running.

Add CSP headers via web server configuration or application settings.

Disable Bookmark Editor for untrusted users

all

Limit access to Bookmark Editor functionality to trusted administrators only.

Configure role-based access controls in ENOVIA to restrict Bookmark Editor permissions.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for Bookmark Editor fields.
  • Monitor and audit Bookmark Editor usage for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Test Bookmark Editor by attempting to inject script payloads (e.g., <script>alert('XSS')</script>) and check if they execute when viewed.

Check Version:

Check ENOVIA version via administrative interface or consult system documentation.

Verify Fix Applied:

After patching, repeat the vulnerability test to confirm script payloads are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual bookmark creation/modification patterns
  • Log entries containing script tags or JavaScript in bookmark-related requests

Network Indicators:

  • HTTP requests with suspicious payloads in bookmark parameters
  • Unexpected outbound connections from user browsers after viewing bookmarks

SIEM Query:

source="web_logs" AND (uri="*bookmark*" AND (message="*<script>*" OR message="*javascript:*"))

🔗 References

📤 Share & Export