Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63691: n/a

0
Critical
VulnerabilityCVE-2025-63691cvecve-2025-63691
Published: Fri Nov 07 2025 (11/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

In pig-mesh In Pig version 3.8.2 and below, within the Token Management function under the System Management module, the token query interface (/api/admin/sys-token/page) has an improper permission verification issue, which leads to information leakage. This interface can be called by any user who has completed login authentication, and it returns the plaintext authentication Tokens of all users currently logged in to the system. As a result, ordinary users can obtain the administrator's authentication Token through this interface, thereby forging an administrator account, gaining the system's management permissions, and taking over the system.

AI-Powered Analysis

AILast updated: 11/14/2025, 16:29:21 UTC

Technical Analysis

CVE-2025-63691 is a critical security vulnerability found in pig-mesh versions 3.8.2 and earlier, specifically within the Token Management function of the System Management module. The vulnerability arises from improper permission verification on the token query interface endpoint (/api/admin/sys-token/page). This endpoint is accessible to any user who has completed login authentication, regardless of their privilege level. When accessed, it returns plaintext authentication tokens for all users currently logged into the system, including those of administrators. Authentication tokens are sensitive credentials that, if compromised, allow an attacker to impersonate the token owner without needing their password. By obtaining an administrator’s token, an attacker can forge an administrator session, thereby gaining full management permissions and effectively taking over the system. The vulnerability is categorized under CWE-285 (Improper Authorization). The CVSS v3.1 base score is 9.6 (critical), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requires privileges (PR:L), no user interaction (UI:N), scope changed (S:C), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). Although no public exploits are currently known, the severity and ease of exploitation make this a significant threat. The lack of a patch link suggests that a fix may not yet be publicly available, increasing urgency for mitigation.

Potential Impact

For European organizations using pig-mesh 3.8.2 or earlier, this vulnerability poses a severe risk of unauthorized system takeover. Attackers with any authenticated user account can escalate privileges to administrator level by stealing authentication tokens, leading to full control over system management functions. This can result in data breaches, unauthorized configuration changes, disruption of services, and potential lateral movement within networks. Confidentiality and integrity of sensitive data are at high risk, especially in sectors relying on pig-mesh for critical infrastructure or internal system management. The vulnerability’s network accessibility and lack of user interaction requirement increase the likelihood of exploitation. Given the critical nature of this flaw, organizations could face regulatory penalties under GDPR if personal data is compromised. The absence of known exploits does not diminish the threat, as attackers may develop exploits rapidly once details are publicized.

Mitigation Recommendations

European organizations should immediately audit their pig-mesh deployments to identify affected versions (3.8.2 and below). Until an official patch is released, implement strict network segmentation and access controls to limit access to the token query API endpoint only to trusted administrators. Employ Web Application Firewalls (WAFs) to detect and block unauthorized API requests targeting /api/admin/sys-token/page. Enforce multi-factor authentication (MFA) for all administrative accounts to reduce risk from token theft. Monitor logs for unusual token query activity or multiple token retrieval attempts by non-administrative users. Consider temporarily disabling or restricting the Token Management function if feasible. Engage with pig-mesh vendors or community for updates and patches. Conduct regular security assessments and penetration testing focused on token management and authorization controls. Finally, educate users about the risks of token exposure and the importance of secure session management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690e10330d6e36ffa2711b92

Added to database: 11/7/2025, 3:28:51 PM

Last enriched: 11/14/2025, 4:29:21 PM

Last updated: 12/23/2025, 7:43:41 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats