Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 08 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pig4cloud
Pig4cloud pig |
|
| CPEs | cpe:2.3:a:pig4cloud:pig:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pig4cloud
Pig4cloud pig |
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pig-mesh
Pig-mesh pig |
|
| Vendors & Products |
Pig-mesh
Pig-mesh pig |
Fri, 07 Nov 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-470 | |
| Metrics |
cvssV3_1
|
Fri, 07 Nov 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat's built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-07T18:41:28.538Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63690
Updated: 2025-11-07T18:36:43.663Z
Status : Analyzed
Published: 2025-11-07T16:15:42.690
Modified: 2025-12-08T16:10:04.333
Link: CVE-2025-63690
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:34:44Z