Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63691: n/a

0
Critical
VulnerabilityCVE-2025-63691cvecve-2025-63691
Published: Fri Nov 07 2025 (11/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system. As a result, ordinary users can obtain the administrator's authentication Token through this interface, thereby forging an administrator account, gaining the system's management permissions, and taking over the system.

AI-Powered Analysis

AILast updated: 11/07/2025, 15:43:57 UTC

Technical Analysis

CVE-2025-63691 affects pig-mesh, a system management tool, specifically versions 3.8.2 and below. The vulnerability resides in the Token Management function's token query interface (/api/admin/sys-token/page), which lacks proper permission verification. Although the interface requires user authentication, it does not restrict access to authorized roles, allowing any logged-in user to retrieve plaintext authentication tokens for all active sessions. These tokens include those of administrator accounts, enabling attackers to impersonate admins and gain full system management privileges. The flaw effectively bypasses role-based access control by exposing sensitive authentication credentials. Exploiting this vulnerability requires only valid user credentials, which could be obtained through phishing or other means. Once exploited, attackers can take over the system, manipulate configurations, and potentially disrupt operations or exfiltrate data. No public exploits are known yet, and no official patches have been released as of the publication date. The vulnerability was reserved on October 27, 2025, and published on November 7, 2025, indicating recent discovery. The absence of a CVSS score necessitates an independent severity assessment based on the impact and exploitability characteristics.

Potential Impact

For European organizations, this vulnerability poses a significant risk to confidentiality, integrity, and availability of critical systems managed by pig-mesh. Unauthorized access to administrator tokens can lead to full system compromise, allowing attackers to alter configurations, disable security controls, or deploy malicious payloads. This could disrupt business operations, cause data breaches, and damage organizational reputation. Sectors such as finance, healthcare, government, and critical infrastructure that rely on pig-mesh for system management are particularly vulnerable. The ease of exploitation—requiring only authenticated user access—lowers the barrier for insider threats or attackers who have compromised low-privilege accounts. The potential for lateral movement and privilege escalation within networks increases the overall threat landscape. Additionally, the lack of public exploits currently provides a window for proactive defense, but also means organizations must act swiftly to prevent future exploitation. The impact is amplified in environments with weak user authentication or insufficient network segmentation.

Mitigation Recommendations

Organizations should immediately audit access controls on the /api/admin/sys-token/page endpoint and restrict it strictly to authorized administrative roles. Implement network-level segmentation and firewall rules to limit access to system management interfaces. Enforce strong authentication mechanisms, such as multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor logs for unusual access patterns to the token query interface and investigate any anomalous token retrieval attempts. Until an official patch is released, consider disabling or restricting the Token Management function if feasible. Conduct thorough user access reviews to minimize the number of users with login privileges. Educate users about phishing and credential security to prevent initial account compromise. Prepare incident response plans to quickly address potential exploitation. Stay informed about vendor updates and apply patches promptly once available. Employ endpoint detection and response (EDR) tools to detect suspicious activity related to token misuse or privilege escalation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690e10330d6e36ffa2711b92

Added to database: 11/7/2025, 3:28:51 PM

Last enriched: 11/7/2025, 3:43:57 PM

Last updated: 11/8/2025, 1:55:06 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats