In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat's built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/LockeTom/vulnerability/blob/main/md/pig_Remote_Code_Execution_Vulnerability.md | Exploit Third Party Advisory |
| https://github.com/pig-mesh/pig/issues/1199 | Broken Link |
Configurations
History
08 Dec 2025, 16:10
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pig4cloud pig
Pig4cloud |
|
| CPE | cpe:2.3:a:pig4cloud:pig:*:*:*:*:*:*:*:* | |
| References | () https://github.com/LockeTom/vulnerability/blob/main/md/pig_Remote_Code_Execution_Vulnerability.md - Exploit, Third Party Advisory | |
| References | () https://github.com/pig-mesh/pig/issues/1199 - Broken Link |
07 Nov 2025, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| CWE | CWE-470 |
07 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-07 16:15
Updated : 2025-12-08 16:10
NVD link : CVE-2025-63690
Mitre link : CVE-2025-63690
CVE.ORG link : CVE-2025-63690
JSON object : View
Products Affected
pig4cloud
- pig
CWE
CWE-470
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
