CVE-2025-10552

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in 3DSwym within 3DSwymer on Release 3DEXPERIENCE R2025x allows attackers to inject malicious scripts that execute in users' browsers when viewing affected content. This affects all users of the vulnerable 3DEXPERIENCE platform version who access the compromised 3DSwym component.

💻 Affected Systems

Products:
  • 3DSwym
  • 3DSwymer
  • 3DEXPERIENCE
Versions: Release 3DEXPERIENCE R2025x
Operating Systems: All platforms running 3DEXPERIENCE
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the 3DSwym component specifically; other components may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems through browser exploitation.

🟠

Likely Case

Session hijacking leading to unauthorized access, data theft, or manipulation of user accounts and platform content.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS typically requires attacker to have some level of access to inject malicious payload, but execution occurs when any user views the compromised content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.3ds.com/trust-center/security/security-advisories/cve-2025-10552

Restart Required: Yes

Instructions:

1. Review vendor advisory for patch details. 2. Apply the official patch from Dassault Systèmes. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header with appropriate directives

Input Validation Filtering

all

Filter and sanitize user input in 3DSwym components

Implement input validation for all user-supplied data in 3DSwym

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Disable or restrict access to 3DSwym component if not essential

🔍 How to Verify

Check if Vulnerable:

Test for XSS by attempting to inject script payloads into 3DSwym input fields and checking if they execute when viewed

Check Version:

Check 3DEXPERIENCE version through platform administration interface or system information

Verify Fix Applied:

Attempt the same XSS payload injection after patching; scripts should not execute and should be properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in user content submissions
  • Multiple failed XSS attempts in web logs

Network Indicators:

  • Unexpected external script loads in HTTP traffic
  • Suspicious POST requests with script payloads

SIEM Query:

source="web_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND dest_port=443

🔗 References

📤 Share & Export