In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system. As a result, ordinary users can obtain the administrator's authentication Token through this interface, thereby forging an administrator account, gaining the system's management permissions, and taking over the system.
References
| Link | Resource |
|---|---|
| https://github.com/LockeTom/vulnerability/blob/main/md/pig_Information_disclosure_vulnerability.md | Exploit Third Party Advisory |
| https://github.com/pig-mesh/pig/issues/1202 | Broken Link |
Configurations
History
No history.
Information
Published : 2025-11-07 16:15
Updated : 2025-12-08 16:08
NVD link : CVE-2025-63691
Mitre link : CVE-2025-63691
CVE.ORG link : CVE-2025-63691
JSON object : View
Products Affected
pig4cloud
- pig
CWE
CWE-285
Improper Authorization
