A vulnerability was found in SohuTV CacheCloud up to 3.2.0. This impacts the function index of the file src/main/java/com/sohu/cache/web/controller/ResourceController.java. Performing manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/sohutv/cachecloud/issues/375 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.338590 | Permissions Required VDB Entry |
| https://vuldb.com/?id.338590 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.716314 | Third Party Advisory VDB Entry |
| https://github.com/sohutv/cachecloud/issues/375 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-29 20:15
Updated : 2026-01-06 21:36
NVD link : CVE-2025-15203
Mitre link : CVE-2025-15203
CVE.ORG link : CVE-2025-15203
JSON object : View
Products Affected
sohu
- cachecloud
