Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 08 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pig4cloud
Pig4cloud pig |
|
| CPEs | cpe:2.3:a:pig4cloud:pig:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pig4cloud
Pig4cloud pig |
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pig-mesh
Pig-mesh pig |
|
| Vendors & Products |
Pig-mesh
Pig-mesh pig |
Fri, 07 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-285 | |
| Metrics |
cvssV3_1
|
Fri, 07 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system. As a result, ordinary users can obtain the administrator's authentication Token through this interface, thereby forging an administrator account, gaining the system's management permissions, and taking over the system. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-07T18:49:24.568Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63691
Updated: 2025-11-07T18:46:19.996Z
Status : Analyzed
Published: 2025-11-07T16:15:42.820
Modified: 2025-12-08T16:08:59.600
Link: CVE-2025-63691
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:34:37Z