{"id":49155,"date":"2025-06-05T21:30:43","date_gmt":"2025-06-05T21:30:43","guid":{"rendered":""},"modified":"2025-10-03T06:50:31","modified_gmt":"2025-10-03T12:50:31","slug":"cve-2025-4983-stored-cross-site-scripting-vulnerability-in-city-referential-manager","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-4983-stored-cross-site-scripting-vulnerability-in-city-referential-manager\/","title":{"rendered":"<strong>CVE-2025-4983: Stored Cross-site Scripting Vulnerability in City Referential Manager<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>CVE-2025-4983 is a critical stored Cross-site Scripting (XSS) vulnerability that affects City Referential Manager on 3DEXPERIENCE R2025x. It allows a malicious actor to inject and execute arbitrary script code within the browser session of an unsuspecting user. Given the global usage of City Referential Manager in urban planning and management, this vulnerability presents significant risk, opening the door to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5100-a-double-free-vulnerability-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"56901\">potential system<\/a> compromise and data leaks. The importance of <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-49842-critical-memory-corruption-vulnerability-in-protected-vm-address-space\/\"  data-wpil-monitor-id=\"59403\">addressing this vulnerability<\/a> cannot be overstated.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-4983<br \/>\nSeverity: High (8.7 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: Potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-42977-path-handling-vulnerability-that-risks-data-leakage-and-system-compromise\/\"  data-wpil-monitor-id=\"56958\">system compromise and data leakage<\/a><\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-64597237\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p><a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4984-stored-cross-site-scripting-vulnerability-in-city-discover-referential-manager\/\"  data-wpil-monitor-id=\"57292\">City Referential<\/a> Manager | 3DEXPERIENCE R2025x<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-57783-xss-vulnerability-in-dot-desktop-application-allows-command-execution\/\"  data-wpil-monitor-id=\"57452\">vulnerability arises from a failure in the application&#8217;s<\/a> input sanitization process, which allows for the injection of unfiltered, malicious script in user-generated data. This malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-36038-remote-code-execution-vulnerability-in-ibm-websphere-application-server\/\"  data-wpil-monitor-id=\"64694\">code is then stored within the application&#8217;s<\/a> database. When other users view this data, the embedded script is executed within their browser, leading to a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47885-stored-xss-vulnerability-in-jenkins-health-advisor-by-cloudbees-plugin\/\"  data-wpil-monitor-id=\"55019\">stored XSS<\/a> attack. The attacker can exploit this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22458-dll-hijacking-vulnerability-in-ivanti-endpoint-manager\/\"  data-wpil-monitor-id=\"56900\">vulnerability to hijack<\/a> user sessions, deface web pages, or redirect the user to malicious sites.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-3437799956\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how the vulnerability might be exploited. The specific malicious payload would vary based on the attacker&#8217;s intent and the specificities of the application.<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/submitData HTTP\/1.1\nHost: cityreferential.example.com\nContent-Type: application\/json\n{\n&quot;userdata&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot;\n}<\/code><\/pre>\n<p>In this example, the malicious payload is being sent to the `submitData` endpoint of the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1277-memory-corruption-vulnerability-in-autodesk-applications-through-malicious-pdf-files\/\"  data-wpil-monitor-id=\"57135\">City Referential<\/a> Manager application. This payload includes a script tag containing malicious JavaScript code, which will be stored by the application and <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1329-local-user-arbitrary-code-execution-vulnerability-in-ibm-cics-tx\/\"  data-wpil-monitor-id=\"59402\">executed when other users<\/a> view this data.<\/p>\n<p><strong>Mitigation<\/strong><\/p>\n<p>To mitigate the risk <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22236-minion-event-bus-authorization-bypass-vulnerability-posing-serious-security-threats\/\"  data-wpil-monitor-id=\"63356\">posed by this vulnerability<\/a>, it is recommended that users apply the vendor patch as soon as it becomes available. In the interim, the use of a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. Furthermore, all <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-35451-unchangeable-hard-coded-credentials-in-ptzoptics-cameras-expose-users-to-data-leakage\/\"  data-wpil-monitor-id=\"88238\">users should be cautious when viewing unfamiliar data<\/a> and immediately report any suspicious activities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview CVE-2025-4983 is a critical stored Cross-site Scripting (XSS) vulnerability that affects City Referential Manager on 3DEXPERIENCE R2025x. It allows a malicious actor to inject and execute arbitrary script code within the browser session of an unsuspecting user. Given the global usage of City Referential Manager in urban planning and management, this vulnerability presents significant [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[81],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-49155","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-xss"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/49155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=49155"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/49155\/revisions"}],"predecessor-version":[{"id":81050,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/49155\/revisions\/81050"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=49155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=49155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=49155"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=49155"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=49155"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=49155"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=49155"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=49155"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=49155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}