CVE-2025-4990
📋 TL;DR
A stored Cross-site Scripting (XSS) vulnerability in Dassault Systèmes 3DEXPERIENCE Product Manager's Change Governance component allows attackers to inject malicious scripts that execute in victims' browsers. This affects all users of 3DEXPERIENCE R2022x through R2025x releases. Attackers could steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- Dassault Systèmes 3DEXPERIENCE Product Manager
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete account takeover leading to data theft, privilege escalation, or lateral movement within the organization's 3DEXPERIENCE environment.
Likely Case
Session hijacking allowing unauthorized access to sensitive product data, intellectual property theft, or manipulation of change governance processes.
If Mitigated
Limited impact with proper input validation and output encoding, potentially only affecting specific user interface elements.
🎯 Exploit Status
Stored XSS typically requires some level of access to input fields, but once injected, affects all users viewing the malicious content. The CVSS score of 8.7 suggests significant impact potential.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific fixed versions
Vendor Advisory: https://www.3ds.com/vulnerability/advisories
Restart Required: Yes
Instructions:
1. Review Dassault Systèmes security advisory. 2. Apply the recommended patch/update. 3. Restart affected services. 4. Verify the fix is applied.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement server-side validation and sanitization of all user inputs in Change Governance fields
Content Security Policy
allImplement strict CSP headers to restrict script execution sources
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads
- Restrict user permissions to minimize who can input data into Change Governance fields
🔍 How to Verify
Check if Vulnerable:
Check 3DEXPERIENCE version against affected range R2022x through R2025x
Check Version:
Check 3DEXPERIENCE administration console or contact Dassault support
Verify Fix Applied:
Verify installation of vendor-provided patch and test XSS payloads no longer execute
📡 Detection & Monitoring
Log Indicators:
- Unusual script tags or JavaScript in Change Governance fields
- Multiple failed XSS attempts in web logs
Network Indicators:
- Unexpected script loads from Change Governance pages
- Suspicious outbound connections from user browsers
SIEM Query:
web_logs WHERE (url CONTAINS 'productmanager' OR 'changegovernance') AND (message CONTAINS '<script' OR 'javascript:' OR suspicious_encoding_patterns)