CVE-2025-63690

In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat's built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pig4cloud:pig:*:*:*:*:*:*:*:*

History

08 Dec 2025, 16:10

Type Values Removed Values Added
First Time Pig4cloud pig
Pig4cloud
CPE cpe:2.3:a:pig4cloud:pig:*:*:*:*:*:*:*:*
References () https://github.com/LockeTom/vulnerability/blob/main/md/pig_Remote_Code_Execution_Vulnerability.md - () https://github.com/LockeTom/vulnerability/blob/main/md/pig_Remote_Code_Execution_Vulnerability.md - Exploit, Third Party Advisory
References () https://github.com/pig-mesh/pig/issues/1199 - () https://github.com/pig-mesh/pig/issues/1199 - Broken Link

07 Nov 2025, 19:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CWE CWE-470

07 Nov 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-07 16:15

Updated : 2025-12-08 16:10


NVD link : CVE-2025-63690

Mitre link : CVE-2025-63690

CVE.ORG link : CVE-2025-63690


JSON object : View

Products Affected

pig4cloud

  • pig
CWE
CWE-470

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')