Home

Description

PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 exposes the PHP version via the X-Powered-By header, enabling attackers to fingerprint the server and assess potential exploits. This information disclosure vulnerability originates from PHP’s base image. Additionally, the PHP version can also be inferred through the PILOS version displayed in the footer and by examining the source code available on GitHub. This information disclosure vulnerability has been patched in PILOS in v4.8.0.

PUBLISHED Reserved 2025-10-15 | Published 2025-10-27 | Updated 2025-10-27 | Assigner GitHub_M




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere

Product status

< 4.8.0
affected

References

github.com/.../PILOS/security/advisories/GHSA-q93h-5j6h-j22x

github.com/...ommit/14655bc4f8128ffd2b3c25004b01d9a802808da8

cve.org (CVE-2025-62524)

nvd.nist.gov (CVE-2025-62524)

Download JSON