CVE-2025-4990

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in Dassault Systèmes 3DEXPERIENCE Product Manager's Change Governance component allows attackers to inject malicious scripts that execute in victims' browsers. This affects all users of 3DEXPERIENCE R2022x through R2025x releases. Attackers could steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • Dassault Systèmes 3DEXPERIENCE Product Manager
Versions: Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x
Operating Systems: Not specified - likely platform independent
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Change Governance component within Product Manager. All deployments within the version range are vulnerable unless patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover leading to data theft, privilege escalation, or lateral movement within the organization's 3DEXPERIENCE environment.

🟠

Likely Case

Session hijacking allowing unauthorized access to sensitive product data, intellectual property theft, or manipulation of change governance processes.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting specific user interface elements.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Stored XSS typically requires some level of access to input fields, but once injected, affects all users viewing the malicious content. The CVSS score of 8.7 suggests significant impact potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Review Dassault Systèmes security advisory. 2. Apply the recommended patch/update. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of all user inputs in Change Governance fields

Content Security Policy

all

Implement strict CSP headers to restrict script execution sources

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XSS payloads
  • Restrict user permissions to minimize who can input data into Change Governance fields

🔍 How to Verify

Check if Vulnerable:

Check 3DEXPERIENCE version against affected range R2022x through R2025x

Check Version:

Check 3DEXPERIENCE administration console or contact Dassault support

Verify Fix Applied:

Verify installation of vendor-provided patch and test XSS payloads no longer execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript in Change Governance fields
  • Multiple failed XSS attempts in web logs

Network Indicators:

  • Unexpected script loads from Change Governance pages
  • Suspicious outbound connections from user browsers

SIEM Query:

web_logs WHERE (url CONTAINS 'productmanager' OR 'changegovernance') AND (message CONTAINS '<script' OR 'javascript:' OR suspicious_encoding_patterns)

🔗 References

📤 Share & Export