{"id":"CVE-2025-63690","details":"In pig-mesh Pig versions 3.8.2 and below, when setting up scheduled tasks in the Quartz management function under the system management module, it is possible to execute any Java class with a parameterless constructor and its methods with parameter type String through reflection. At this time, the eval method in Tomcat's built-in class jakarta.el.ELProcessor can be used to execute commands, leading to a remote code execution vulnerability.","modified":"2026-03-13T03:40:54.229954Z","published":"2025-11-07T16:15:42.690Z","references":[{"type":"REPORT","url":"https://github.com/pig-mesh/pig/issues/1199"},{"type":"EVIDENCE","url":"https://github.com/LockeTom/vulnerability/blob/main/md/pig_Remote_Code_Execution_Vulnerability.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pig-mesh/pig","events":[{"introduced":"0"},{"last_affected":"a24a044ede1fdfcca1e37bd9664a905b494d88b5"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.8.2"}]}}],"versions":["3.5.3","3.7.6","3.8.0","3.8.1","3.8.2","v3.4.3","v3.5.2","v3.6.0","v3.6.1","v3.6.2","v3.6.3","v3.6.4","v3.7.1","v3.7.2","v3.7.5","v3.7.6","v3.8.0","v3.8.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-63690.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}]}