In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat's built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/LockeTom/vulnerability/blob/main/md/pig_Remote_Code_Execution_Vulnerability.md | Exploit Third Party Advisory |
| https://github.com/pig-mesh/pig/issues/1199 | Broken Link |
Configurations
History
No history.
Information
Published : 2025-11-07 16:15
Updated : 2025-12-08 16:10
NVD link : CVE-2025-63690
Mitre link : CVE-2025-63690
CVE.ORG link : CVE-2025-63690
JSON object : View
Products Affected
pig4cloud
- pig
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
