CVE-2025-4988

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in Dassault Systèmes' 3DEXPERIENCE platform allows attackers to inject malicious scripts into Results Analytics in Multidisciplinary Optimization Engineer. When users view affected content, the scripts execute in their browser sessions, potentially compromising their accounts. This affects organizations using 3DEXPERIENCE R2022x through R2024x.

💻 Affected Systems

Products:
  • 3DEXPERIENCE Multidisciplinary Optimization Engineer
Versions: R2022x through R2024x
Operating Systems: All platforms running 3DEXPERIENCE
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Results Analytics component specifically; requires attacker to have access to inject content into the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, perform session hijacking, install malware on user systems, or pivot to internal network resources through compromised accounts.

🟠

Likely Case

Attackers steal user session cookies and authentication tokens to impersonate legitimate users, potentially accessing sensitive engineering data or modifying optimization results.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching users, preventing execution while maintaining functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS typically requires some level of access to inject malicious content, but once injected, exploitation is straightforward for any user viewing the content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Review Dassault Systèmes security advisory. 2. Apply the latest security update for your 3DEXPERIENCE version. 3. Restart affected services. 4. Verify the fix by testing XSS payloads in Results Analytics.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on Results Analytics data entry points to reject or sanitize script tags and JavaScript content.

Configuration through 3DEXPERIENCE administration console

Content Security Policy

all

Implement strict Content Security Policy headers to restrict script execution sources and prevent inline script execution.

Add CSP headers via web server configuration or application settings

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads targeting Results Analytics endpoints
  • Restrict user permissions to minimize who can create or modify content in Results Analytics

🔍 How to Verify

Check if Vulnerable:

Test by attempting to inject basic XSS payloads (e.g., <script>alert('XSS')</script>) into Results Analytics fields and checking if they execute when viewed.

Check Version:

Check 3DEXPERIENCE version through administration console or system information panels

Verify Fix Applied:

After patching, repeat XSS testing with common payloads; scripts should be properly encoded or rejected without execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual content submissions to Results Analytics containing script tags or JavaScript patterns
  • Multiple failed login attempts following content views

Network Indicators:

  • Outbound connections to suspicious domains following Results Analytics access
  • Unusual data exfiltration patterns

SIEM Query:

source="3dexperience_logs" AND (message="*<script>*" OR message="*javascript:*") AND component="ResultsAnalytics"

🔗 References

📤 Share & Export