PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 includes a Cross-Origin Resource Sharing (CORS) misconfiguration in its middleware: it reflects the Origin request header back in the Access-Control-Allow-Origin response header without proper validation or a whitelist, while Access-Control-Allow-Credentials is set to true. This behavior could allow a malicious website on a different origin to send requests (including credentials) to the PILOS API. This may enable exfiltration or actions using the victim’s credentials if the server accepts those cross-origin requests as authenticated. Laravel’s session handling applies additional origin checks such that cross-origin requests are not authenticated by default. Because of these session-origin protections, and in the absence of any other unknown vulnerabilities that would bypass Laravel’s origin/session checks, this reflected-Origin CORS misconfiguration is not believed to be exploitable in typical PILOS deployments. This vulnerability has been patched in PILOS in v4.8.0
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 28 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Thm Thm pilos | |
| Vendors & Products | Thm Thm pilos | 
Mon, 27 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Mon, 27 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | PILOS (Platform for Interactive Live-Online Seminars) is a frontend for BigBlueButton. PILOS before 4.8.0 includes a Cross-Origin Resource Sharing (CORS) misconfiguration in its middleware: it reflects the Origin request header back in the Access-Control-Allow-Origin response header without proper validation or a whitelist, while Access-Control-Allow-Credentials is set to true. This behavior could allow a malicious website on a different origin to send requests (including credentials) to the PILOS API. This may enable exfiltration or actions using the victim’s credentials if the server accepts those cross-origin requests as authenticated. Laravel’s session handling applies additional origin checks such that cross-origin requests are not authenticated by default. Because of these session-origin protections, and in the absence of any other unknown vulnerabilities that would bypass Laravel’s origin/session checks, this reflected-Origin CORS misconfiguration is not believed to be exploitable in typical PILOS deployments. This vulnerability has been patched in PILOS in v4.8.0 | |
| Title | PILOS Misconfigured the Access-Control-Allow-Origin Header | |
| Weaknesses | CWE-942 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-27T20:10:51.351Z
Updated: 2025-10-27T20:38:52.301Z
Reserved: 2025-10-15T15:03:28.135Z
Link: CVE-2025-62523
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-27T20:38:49.494Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-27T21:15:37.770
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-62523
 Redhat
                        Redhat
                    No data.