CVE-2025-0600
📋 TL;DR
A stored Cross-site Scripting (XSS) vulnerability in ENOVIA Collaborative Industry Innovator's Product Explorer allows attackers to inject malicious scripts that execute in users' browsers. This affects organizations using 3DEXPERIENCE R2024x with ENOVIA, potentially compromising user sessions and data.
💻 Affected Systems
- ENOVIA Collaborative Industry Innovator
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware through the user's browser.
Likely Case
Session hijacking leading to unauthorized access, data theft, or manipulation of application content visible to other users.
If Mitigated
Limited impact if input validation and output encoding are enforced, though stored XSS could still affect users viewing malicious content.
🎯 Exploit Status
Requires attacker to inject malicious script into stored content that other users will view; typical XSS exploitation techniques apply.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patch version
Vendor Advisory: https://www.3ds.com/vulnerability/advisories
Restart Required: No
Instructions:
1. Review vendor advisory for patch details. 2. Apply the official patch from Dassault Systèmes. 3. Test in non-production environment first. 4. Deploy to production systems.
🔧 Temporary Workarounds
Input Validation and Output Encoding
allImplement strict input validation and proper output encoding for all user-controllable inputs in Product Explorer.
Content Security Policy (CSP)
allDeploy a strict Content Security Policy to restrict script execution sources.
🧯 If You Can't Patch
- Restrict user permissions to minimize who can create/modify content in Product Explorer
- Implement web application firewall (WAF) rules to detect and block XSS payloads
🔍 How to Verify
Check if Vulnerable:
Test by attempting to inject script payloads into Product Explorer fields and observing if they execute when viewed.
Check Version:
Check application version through ENOVIA/3DEXPERIENCE administration interface
Verify Fix Applied:
After patching, repeat vulnerability testing to confirm script execution is prevented.
📡 Detection & Monitoring
Log Indicators:
- Unusual content creation/modification in Product Explorer
- Script tags or JavaScript in user input fields
Network Indicators:
- Outbound connections to suspicious domains following Product Explorer access
SIEM Query:
Search for patterns like <script> or javascript: in application logs related to Product Explorer