Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15200: Cross Site Scripting in SohuTV CacheCloud

0
Medium
VulnerabilityCVE-2025-15200cvecve-2025-15200
Published: Mon Dec 29 2025 (12/29/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SohuTV
Product: CacheCloud

Description

A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. The affected element is the function getExceptionStatisticsByClient/getCommandStatisticsByClient/doIndex of the file src/main/java/com/sohu/cache/web/controller/AppClientDataShowController.java. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:16:07 UTC

Technical Analysis

CVE-2025-15200 is a cross-site scripting vulnerability identified in SohuTV CacheCloud versions 3.0 through 3.2.0. The vulnerability resides in the AppClientDataShowController.java file, specifically within the functions getExceptionStatisticsByClient, getCommandStatisticsByClient, and doIndex. These functions handle client-side statistics data but fail to properly sanitize or encode user-supplied input before reflecting it in web responses. As a result, an attacker can craft malicious input that, when processed by these functions, leads to the injection and execution of arbitrary JavaScript code in the context of the victim's browser. The attack vector is remote and does not require authentication, but user interaction is necessary, such as clicking a malicious link or visiting a compromised page. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the ease of exploitation (low complexity), no privileges required, but requiring user interaction and limited impact on confidentiality and integrity. The vulnerability could enable attackers to steal session tokens, perform actions on behalf of users, or deliver further malware. Despite early notification, the vendor has not released a patch, and a public exploit is available, increasing the risk of exploitation. The vulnerability affects organizations using CacheCloud for caching or data management, particularly those exposing client statistics interfaces to users or administrators.

Potential Impact

For European organizations, this vulnerability could lead to client-side attacks such as session hijacking, credential theft, or unauthorized actions performed within the context of a user's session. Organizations that expose CacheCloud's client statistics interfaces on public or semi-public networks are at higher risk. The impact on confidentiality and integrity is limited but non-negligible, as attackers can execute scripts in users' browsers, potentially leading to data leakage or account compromise. Availability impact is minimal. Given the lack of vendor response and public exploit availability, attackers may target vulnerable systems opportunistically. This risk is heightened in sectors with high reliance on caching infrastructure for performance, such as e-commerce, finance, and media. Additionally, organizations with less mature security controls or limited monitoring may be more vulnerable to exploitation and subsequent lateral movement or data exfiltration attempts.

Mitigation Recommendations

1. Immediately restrict access to the vulnerable endpoints (getExceptionStatisticsByClient, getCommandStatisticsByClient, doIndex) by implementing network-level controls such as IP whitelisting or VPN-only access. 2. Implement strict input validation and output encoding on all user-supplied data processed by CacheCloud, especially in the affected controller functions, to prevent script injection. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting CacheCloud endpoints. 4. Monitor web server and application logs for unusual requests or patterns indicative of XSS exploitation attempts. 5. Educate users and administrators about the risk of clicking suspicious links related to CacheCloud interfaces. 6. If feasible, isolate CacheCloud management interfaces from public networks and restrict access to trusted personnel only. 7. Track vendor communications for any forthcoming patches and plan for timely updates once available. 8. Consider deploying Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting script execution sources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T10:16:36.231Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b3db813ff03e2beec4

Added to database: 12/30/2025, 10:22:43 PM

Last enriched: 12/30/2025, 11:16:07 PM

Last updated: 2/3/2026, 12:09:26 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats