CVE-2025-63691
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-07

Last updated on: 2025-12-08

Assigner: MITRE

Description
In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system. As a result, ordinary users can obtain the administrator's authentication Token through this interface, thereby forging an administrator account, gaining the system's management permissions, and taking over the system.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-07
Last Modified
2025-12-08
Generated
2026-05-06
AI Q&A
2025-11-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pig4cloud pig to 3.8.2 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in pig-mesh version 3.8.2 and below, specifically in the Token Management function under the System Management module. The token query interface (/api/admin/sys-token/page) does not properly verify permissions, allowing any logged-in user to access it. This interface returns plaintext authentication tokens of all users currently logged in, enabling ordinary users to obtain administrator tokens, impersonate administrators, and gain management permissions to take over the system.


How can this vulnerability impact me? :

The vulnerability can lead to severe security impacts, including unauthorized access to administrator accounts by ordinary users. Attackers can use stolen administrator tokens to gain full management permissions, potentially taking over the entire system, leading to data breaches, loss of control, and compromise of system integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart