CVE-2026-2101
Dassault Systèmes · ENOVIAvpm
A Reflected Cross-Site Scripting (XSS) vulnerability in ENOVIAvpm Web Access allows attackers to execute arbitrary scripts in a user's browser session.
Executive summary
Users of ENOVIAvpm are vulnerable to session hijacking and unauthorized actions due to a high-severity reflected XSS flaw in the Web Access component.
Vulnerability
This reflected XSS vulnerability exists in the ENOVIAvpm Web Access interface. An attacker can craft a malicious URL that, when clicked by a victim, executes arbitrary JavaScript in the context of the victim's browser session, bypassing same-origin policies.
Business impact
Successful exploitation can lead to the theft of session tokens, allowing an attacker to impersonate legitimate users and access sensitive engineering or product lifecycle data. With a CVSS score of 8.7, this vulnerability poses a significant risk to intellectual property and organizational data integrity.
Remediation
Immediate Action: Apply the security updates provided by Dassault Systèmes for ENOVIAvpm Web Access immediately.
Proactive Monitoring: Monitor web logs for suspicious URL parameters containing script tags or encoded characters typically used in XSS attacks.
Compensating Controls: Educate users on the risks of clicking untrusted links and deploy a Web Application Firewall (WAF) to detect and block reflected XSS patterns.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The 8.7 CVSS score indicates a critical need for patching. Given the sensitive nature of the data stored in ENOVIAvpm, administrators must ensure that all Web Access components are updated to the latest secure release to prevent the compromise of user sessions.