CVE-2025-0599
📋 TL;DR
A stored Cross-site Scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator's Document Management allows attackers to inject malicious scripts that execute in users' browsers. This affects organizations using 3DEXPERIENCE R2024x with ENOVIA, potentially compromising user sessions and data.
💻 Affected Systems
- ENOVIA Collaborative Industry Innovator
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, exfiltrate sensitive data, or deploy malware to users' systems.
Likely Case
Session hijacking leading to unauthorized access to documents and systems, data theft, or defacement of the document management interface.
If Mitigated
Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.
🎯 Exploit Status
Requires attacker to have ability to upload or modify documents; exploitation depends on user interaction with malicious content.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patch version
Vendor Advisory: https://www.3ds.com/vulnerability/advisories
Restart Required: No
Instructions:
1. Review vendor advisory for patch details. 2. Apply the official patch from Dassault Systèmes. 3. Test in non-production environment first. 4. Deploy to production systems.
🔧 Temporary Workarounds
Implement Content Security Policy
allAdd CSP headers to restrict script execution sources
Add 'Content-Security-Policy' header with appropriate directives
Input Validation Enhancement
allImplement strict input validation on document uploads and content
Configure input validation rules in ENOVIA settings
🧯 If You Can't Patch
- Restrict document upload permissions to trusted users only
- Implement web application firewall (WAF) rules to block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Test document upload with XSS payloads; check if scripts execute when viewed
Check Version:
Check ENOVIA version in administration console or via vendor documentation
Verify Fix Applied:
Retest with XSS payloads after patch; verify scripts are properly sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual document upload patterns
- Script tags in document content logs
- Multiple failed XSS attempts
Network Indicators:
- HTTP requests containing script payloads in document parameters
- Unusual outbound connections after document views
SIEM Query:
source="ENOVIA" AND (event="document_upload" AND (content CONTAINS "<script>" OR content CONTAINS "javascript:"))