{"id":49200,"date":"2025-06-06T03:33:19","date_gmt":"2025-06-06T03:33:19","guid":{"rendered":""},"modified":"2025-08-31T18:38:09","modified_gmt":"2025-09-01T00:38:09","slug":"cve-2025-4990-stored-cross-site-scripting-vulnerability-in-3dexperience-product-manager","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-4990-stored-cross-site-scripting-vulnerability-in-3dexperience-product-manager\/","title":{"rendered":"<strong>CVE-2025-4990: Stored Cross-Site Scripting Vulnerability in 3DEXPERIENCE Product Manager<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>In the continually evolving cybersecurity world, vigilance is paramount. The vulnerability under focus in this article is CVE-2025-4990, a stored Cross-Site Scripting (XSS) vulnerability that impacts Change Governance in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x. This <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46463-critical-sql-injection-vulnerability-in-yamna-khawaja-mailing-group-listserv\/\"  data-wpil-monitor-id=\"55075\">vulnerability is of critical<\/a> importance due to its capacity to allow an attacker to execute arbitrary script code in a user&#8217;s browser session, potentially leading to system compromise or data leakage.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-4990<br \/>\nSeverity: High (8.7 CVSS Score)<br \/>\nAttack Vector: Web-based (<a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4991-stored-xss-vulnerability-in-3d-markup-collaborative-industry-innovator\/\"  data-wpil-monitor-id=\"57326\">Stored XSS<\/a>)<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: Required<br \/>\nImpact: System compromise, potential <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48383-django-select2-vulnerability-risking-data-leakage-and-unauthorized-access\/\"  data-wpil-monitor-id=\"56147\">data leakage<\/a><\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-815293060\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>3DEXPERIENCE <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45997-exploiting-file-upload-vulnerability-in-web-based-pharmacy-product-management-system\/\"  data-wpil-monitor-id=\"57327\">Product Manager<\/a> | R2022x to R2025x<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit operates by injecting malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-39357-sql-injection-vulnerability-in-mojoomla-hospital-management-system\/\"  data-wpil-monitor-id=\"55071\">script<\/a> code into the Change Governance component of the affected Product Manager versions. This injected <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48828-arbitrary-php-code-execution-in-vbulletin-via-template-conditionals\/\"  data-wpil-monitor-id=\"55760\">code is then stored and executed<\/a> whenever an end user accesses the compromised pages, thereby launching the attacker&#8217;s script within the user&#8217;s browser session. This script execution can lead to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-39350-unauthorized-access-vulnerability-in-rocket-apps-wproject\/\"  data-wpil-monitor-id=\"55634\">unauthorized system access<\/a> or data exfiltration, depending on the attacker&#8217;s intent.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1052440962\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Here is a conceptual example of how the vulnerability might be exploited. In this case, a malicious <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5739-critical-buffer-overflow-vulnerability-in-totolink-x15-http-post-request-handler\/\"  data-wpil-monitor-id=\"59832\">HTTP POST request<\/a> is sent containing the harmful payload:<\/p>\n<pre><code class=\"\" data-line=\"\">POST \/change_governance\/endpoint HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{ &quot;malicious_payload&quot;: &quot;&lt;script&gt;evil_script_here&lt;\/script&gt;&quot; }<\/code><\/pre>\n<p>In this example, &#8220;evil_script_here&#8221; would be replaced by the attacker&#8217;s actual malicious script. When an unsuspecting user accesses the affected page, the stored script is executed within their browser, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-5100-a-double-free-vulnerability-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"56604\">potentially leading to system<\/a> compromise or data leakage.<\/p>\n<p><strong>Mitigation and Prevention<\/strong><\/p>\n<p>The recommended mitigation for this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-49002-critical-vulnerability-in-dataease-bypassing-patch-for-cve-2025-32966\/\"  data-wpil-monitor-id=\"59833\">vulnerability is to apply the vendor-provided patch<\/a>. For temporary mitigation, a Web Application Firewall (WAF) or an Intrusion Detection System (IDS) can be used to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-20217-denial-of-service-vulnerability-in-snort-3-detection-engine-of-cisco-secure-firewall-threat-defense-software\/\"  data-wpil-monitor-id=\"77069\">detect and block attempts to exploit this vulnerability<\/a>. Regularly updating and patching software, educating users about the risks of suspicious links, and implementing robust <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-1763-cross-site-scripting-and-content-security-policy-bypass-in-gitlab-ee\/\"  data-wpil-monitor-id=\"57348\">security policies<\/a> can also help prevent such vulnerabilities from being exploited.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview In the continually evolving cybersecurity world, vigilance is paramount. The vulnerability under focus in this article is CVE-2025-4990, a stored Cross-Site Scripting (XSS) vulnerability that impacts Change Governance in Product Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2025x. This vulnerability is of critical importance due to its capacity to allow an attacker to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[81],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-49200","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-xss"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/49200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=49200"}],"version-history":[{"count":10,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/49200\/revisions"}],"predecessor-version":[{"id":69450,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/49200\/revisions\/69450"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=49200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=49200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=49200"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=49200"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=49200"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=49200"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=49200"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=49200"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=49200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}