CVE-2025-4992

8.7 HIGH

📋 TL;DR

A stored Cross-site Scripting (XSS) vulnerability in Service Items Management within Service Process Engineer allows attackers to inject malicious scripts that execute in users' browsers. This affects 3DEXPERIENCE releases from R2024x through R2025x, potentially compromising users who access the affected service items.

💻 Affected Systems

Products:
  • 3DEXPERIENCE Service Process Engineer
Versions: Release 3DEXPERIENCE R2024x through Release 3DEXPERIENCE R2025x
Operating Systems: Not OS-specific - application vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Service Items Management functionality specifically; requires attacker to have ability to create/modify service items.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on user systems.

🟠

Likely Case

Session hijacking leading to unauthorized access, data theft, or manipulation of service items within the application.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, though some functionality disruption may occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to create/modify service items; stored XSS means payload persists and affects all users viewing the compromised item.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched releases

Vendor Advisory: https://www.3ds.com/vulnerability/advisories

Restart Required: Yes

Instructions:

1. Review Dassault Systèmes advisory 2. Apply recommended patches/updates 3. Restart affected services 4. Verify fix implementation

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement strict input validation and output encoding for service item fields

Application-specific configuration - no universal commands

Content Security Policy

all

Implement CSP headers to restrict script execution sources

Add CSP headers via web server configuration or application settings

🧯 If You Can't Patch

  • Restrict user permissions for service item creation/modification
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test if script tags in service item fields execute when viewed by other users

Check Version:

Check 3DEXPERIENCE version via administration console or system information

Verify Fix Applied:

Attempt XSS payload injection in service items and verify scripts do not execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual service item modifications
  • Script-like content in service item fields
  • Multiple failed XSS attempts

Network Indicators:

  • Unexpected external script loads from service item pages
  • Suspicious POST requests to service item endpoints

SIEM Query:

source="3dexperience-logs" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export