Cyber Posture

CVE-2025-0599

High

Published: 17 March 2025

Published
17 March 2025
Modified
22 October 2025
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0035 57.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service.

Security Summary

CVE-2025-0599 is a stored Cross-site Scripting (XSS) vulnerability, mapped to CWE-79, affecting the Document Management component in ENOVIA Collaborative Industry Innovator on the 3DEXPERIENCE R2024x release. Published on 2025-03-17T14:15:20.403, it carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N). The issue enables an attacker to execute arbitrary script code within a user's browser session.

Exploitation requires an attacker to possess low privileges (PR:L) on the system, allowing them to inject and store a malicious script payload via the Document Management functionality. A victim user must then interact with the tainted document over the network (AV:N) with low complexity (AC:L) and some user interaction (UI:R), triggering script execution in their browser context (S:C). Successful exploitation can result in high confidentiality and integrity impacts (C:H/I:H), such as stealing sensitive data, impersonating the user, or altering the application's behavior, with no direct availability disruption (A:N).

Mitigation guidance is available in the vendor advisory at https://www.3ds.com/vulnerability/advisories.

Details

CWE(s)
CWE-79

Affected Products

3ds
3dexperience enovia
r2024x

MITRE ATT&CK Enterprise Techniques

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1056.003 Web Portal Capture Collection
Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service.
Why these techniques?

Stored XSS enables arbitrary JavaScript execution in the victim's browser session, directly facilitating session cookie theft for hijacking (T1185) and capturing credentials/input from web portals (T1056.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References