CVE-2025-4985

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in Dassault Systèmes 3DEXPERIENCE Project Portfolio Manager allows attackers to inject malicious scripts that execute in users' browsers. This affects all users of 3DEXPERIENCE releases R2022x through R2025x. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • 3DEXPERIENCE Project Portfolio Manager
Versions: Release R2022x through Release R2025x
Operating Systems: All platforms running 3DEXPERIENCE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Risk Management module specifically. All deployments within the version range are vulnerable unless patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, data theft, privilege escalation, and lateral movement within the application.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized actions performed as authenticated users.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to inject malicious scripts. Stored XSS means payload persists and affects multiple users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patch versions

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Review Dassault Systèmes security advisory. 2. Apply the recommended patch/update. 3. Restart 3DEXPERIENCE services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Input Validation Filtering

all

Implement server-side validation for all user inputs in Risk Management module

🧯 If You Can't Patch

  • Restrict user permissions to minimize attack surface
  • Implement web application firewall (WAF) with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Check 3DEXPERIENCE version against affected range R2022x-R2025x

Check Version:

Check 3DEXPERIENCE administration console or contact Dassault support

Verify Fix Applied:

Verify patch installation and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags in user inputs
  • Multiple failed XSS attempts

Network Indicators:

  • Suspicious JavaScript payloads in HTTP requests

SIEM Query:

source="3dexperience" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:")

🔗 References

📤 Share & Export