CVE-2025-15201: Cross Site Scripting in SohuTV CacheCloud
A flaw has been found in SohuTV CacheCloud up to 3.2.0. The impacted element is the function redirectNoPower of the file src/main/java/com/sohu/cache/web/controller/WebResourceController.java. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2025-15201 is a cross-site scripting vulnerability affecting SohuTV CacheCloud versions 3.0 through 3.2.0. The vulnerability resides in the redirectNoPower function of the WebResourceController.java source file, where insufficient sanitization of user-controlled input allows injection of malicious scripts. This flaw can be exploited remotely without authentication, but requires user interaction, such as clicking a crafted URL that triggers the vulnerable redirect. The vulnerability enables attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 4.0 score of 5.1 reflects a medium severity, considering the ease of remote exploitation but the requirement for user interaction and limited impact on confidentiality and integrity. The vendor was notified early but has not yet issued a patch, and no known exploits in the wild have been reported. Given CacheCloud’s role in caching and content delivery, this vulnerability could be leveraged to target users of web applications relying on this product, especially in environments where user trust and session integrity are critical.
Potential Impact
For European organizations, the impact of this XSS vulnerability can be significant in sectors relying on SohuTV CacheCloud for content caching and delivery, such as media companies, streaming services, and enterprises with web portals. Successful exploitation could lead to session hijacking, enabling attackers to impersonate legitimate users and access sensitive information or perform unauthorized actions. It could also facilitate phishing attacks by injecting malicious scripts that alter webpage content or redirect users to fraudulent sites. While the vulnerability does not directly compromise system availability or allow privilege escalation, the breach of user trust and potential data leakage can have reputational and regulatory consequences, especially under GDPR requirements for data protection. Organizations with high user interaction on affected web applications are at greater risk. The lack of an official patch increases the urgency for interim mitigations to reduce exposure.
Mitigation Recommendations
1. Implement strict input validation and output encoding on all user-supplied data, especially in URL parameters handled by the redirectNoPower function. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Use web application firewalls (WAFs) to detect and block malicious payloads targeting the vulnerable endpoint. 4. Monitor web traffic for unusual redirect patterns or injection attempts. 5. Isolate or sandbox the affected CacheCloud instances to limit exposure. 6. Engage with SohuTV for updates and patches, and plan for timely upgrades once available. 7. Educate users about the risks of clicking untrusted links to reduce the likelihood of successful exploitation. 8. Review and harden session management to mitigate session hijacking risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-15201: Cross Site Scripting in SohuTV CacheCloud
Description
A flaw has been found in SohuTV CacheCloud up to 3.2.0. The impacted element is the function redirectNoPower of the file src/main/java/com/sohu/cache/web/controller/WebResourceController.java. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
CVE-2025-15201 is a cross-site scripting vulnerability affecting SohuTV CacheCloud versions 3.0 through 3.2.0. The vulnerability resides in the redirectNoPower function of the WebResourceController.java source file, where insufficient sanitization of user-controlled input allows injection of malicious scripts. This flaw can be exploited remotely without authentication, but requires user interaction, such as clicking a crafted URL that triggers the vulnerable redirect. The vulnerability enables attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 4.0 score of 5.1 reflects a medium severity, considering the ease of remote exploitation but the requirement for user interaction and limited impact on confidentiality and integrity. The vendor was notified early but has not yet issued a patch, and no known exploits in the wild have been reported. Given CacheCloud’s role in caching and content delivery, this vulnerability could be leveraged to target users of web applications relying on this product, especially in environments where user trust and session integrity are critical.
Potential Impact
For European organizations, the impact of this XSS vulnerability can be significant in sectors relying on SohuTV CacheCloud for content caching and delivery, such as media companies, streaming services, and enterprises with web portals. Successful exploitation could lead to session hijacking, enabling attackers to impersonate legitimate users and access sensitive information or perform unauthorized actions. It could also facilitate phishing attacks by injecting malicious scripts that alter webpage content or redirect users to fraudulent sites. While the vulnerability does not directly compromise system availability or allow privilege escalation, the breach of user trust and potential data leakage can have reputational and regulatory consequences, especially under GDPR requirements for data protection. Organizations with high user interaction on affected web applications are at greater risk. The lack of an official patch increases the urgency for interim mitigations to reduce exposure.
Mitigation Recommendations
1. Implement strict input validation and output encoding on all user-supplied data, especially in URL parameters handled by the redirectNoPower function. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Use web application firewalls (WAFs) to detect and block malicious payloads targeting the vulnerable endpoint. 4. Monitor web traffic for unusual redirect patterns or injection attempts. 5. Isolate or sandbox the affected CacheCloud instances to limit exposure. 6. Engage with SohuTV for updates and patches, and plan for timely upgrades once available. 7. Educate users about the risks of clicking untrusted links to reduce the likelihood of successful exploitation. 8. Review and harden session management to mitigate session hijacking risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T10:16:46.023Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b3db813ff03e2beea3
Added to database: 12/30/2025, 10:22:43 PM
Last enriched: 12/30/2025, 11:14:10 PM
Last updated: 2/7/2026, 6:09:52 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.