CVE-2025-0602

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in the Compare feature of Collaborative Industry Innovator within 3DEXPERIENCE allows attackers to inject malicious scripts that execute in users' browsers. This affects all users of 3DEXPERIENCE releases from R2023x through R2025x. The vulnerability enables session hijacking, data theft, and unauthorized actions within authenticated sessions.

💻 Affected Systems

Products:
  • 3DEXPERIENCE Collaborative Industry Innovator
Versions: Release 3DEXPERIENCE R2023x through R2025x
Operating Systems: All platforms running 3DEXPERIENCE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Compare feature specifically; requires attacker to have access to inject malicious content.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover leading to data exfiltration, privilege escalation, and lateral movement within the 3DEXPERIENCE environment.

🟠

Likely Case

Session hijacking allowing unauthorized access to user data and functionality, potentially leading to data theft or manipulation.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, though some data exposure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS requires attacker to inject malicious script into the Compare feature, which then executes when other users view the content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Review vendor advisory for specific patch details. 2. Apply the latest security update from Dassault Systèmes. 3. Restart affected 3DEXPERIENCE services. 4. Verify the fix by testing the Compare feature.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation and output encoding for the Compare feature to prevent script injection.

Content Security Policy (CSP)

all

Implement a strict CSP header to restrict script execution sources and prevent inline script execution.

🧯 If You Can't Patch

  • Disable the Compare feature if not essential for business operations.
  • Implement web application firewall (WAF) rules to detect and block XSS payloads targeting the Compare functionality.

🔍 How to Verify

Check if Vulnerable:

Test the Compare feature by attempting to inject basic XSS payloads (e.g., <script>alert('test')</script>) and observing if they execute.

Check Version:

Check 3DEXPERIENCE version through administration console or by consulting system documentation.

Verify Fix Applied:

After patching, repeat XSS testing with various payloads to confirm they are properly sanitized and do not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in Compare feature logs
  • Multiple failed XSS attempts in web server logs

Network Indicators:

  • HTTP requests containing suspicious script patterns to Compare endpoints
  • Unexpected JavaScript execution in browser sessions

SIEM Query:

source="web_server" AND (uri="*compare*" OR uri="*Compare*") AND (content="<script>" OR content="javascript:")

🔗 References

📤 Share & Export