A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. The affected element is the function getExceptionStatisticsByClient/getCommandStatisticsByClient/doIndex of the file src/main/java/com/sohu/cache/web/controller/AppClientDataShowController.java. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/sohutv/cachecloud/issues/372 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/sohutv/cachecloud/issues/382 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.338587 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338587 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.716311 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.716323 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.716324 | Third Party Advisory VDB Entry |
| https://github.com/sohutv/cachecloud/issues/372 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/sohutv/cachecloud/issues/382 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-29 19:15
Updated : 2026-01-06 21:38
NVD link : CVE-2025-15200
Mitre link : CVE-2025-15200
CVE.ORG link : CVE-2025-15200
JSON object : View
Products Affected
sohu
- cachecloud
