CVE-2025-15204: Cross Site Scripting in SohuTV CacheCloud
A vulnerability was determined in SohuTV CacheCloud up to 3.2.0. Affected is the function doQuartzList of the file src/main/java/com/sohu/cache/web/controller/QuartzManageController.java. Executing manipulation can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2025-15204 is a cross-site scripting (XSS) vulnerability identified in SohuTV CacheCloud versions 3.0 through 3.2.0. The flaw exists in the doQuartzList function within the QuartzManageController.java source file, which is part of the web controller handling scheduled tasks. The vulnerability arises due to insufficient sanitization of user-supplied input that is reflected in the web interface, allowing an attacker to inject malicious JavaScript code. Exploitation requires the attacker to have high privileges (PR:H) but does not require authentication (AT:N) or confidentiality impact (VC:N). User interaction (UI:P) is necessary, meaning a victim must trigger the malicious payload, typically by visiting a crafted URL or interface. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L). Although the vendor was notified early, no patch or official response has been issued, and the exploit details have been publicly disclosed, increasing the risk of exploitation. While no known exploits are currently active in the wild, the public disclosure and lack of remediation elevate the threat level. The vulnerability primarily threatens the integrity of user sessions and could facilitate phishing or session hijacking attacks within the affected environment. The CVSS 4.8 score reflects a medium severity rating, balancing the ease of exploitation with limited impact on confidentiality and availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-15204 lies in the potential compromise of user sessions and the integrity of web interactions within CacheCloud management interfaces. Organizations relying on CacheCloud for caching and task scheduling in media or content delivery environments may face risks of targeted XSS attacks that could lead to credential theft, session hijacking, or social engineering attacks against privileged users. Although the vulnerability does not directly affect data confidentiality or system availability, successful exploitation could enable attackers to perform unauthorized actions under the guise of legitimate users, potentially leading to further compromise. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or operators. The lack of vendor response and patch availability increases exposure time, necessitating proactive defensive measures. Additionally, organizations in regulated sectors must consider compliance implications related to the exploitation of such vulnerabilities.
Mitigation Recommendations
1. Restrict access to the CacheCloud management interface and specifically the doQuartzList function to trusted administrators only, using network segmentation and strong access controls. 2. Implement strict input validation and output encoding on all user-supplied data within the affected function to neutralize malicious scripts. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting CacheCloud endpoints. 4. Monitor logs and user activity for unusual patterns or repeated access attempts to the vulnerable function. 5. Educate privileged users about the risks of clicking on untrusted links and the importance of verifying URLs before interaction. 6. Consider temporary disabling or limiting the use of the affected functionality if feasible until an official patch is released. 7. Engage with the vendor or community to track patch releases or official mitigations. 8. Conduct regular security assessments and penetration tests focusing on web interface vulnerabilities in CacheCloud deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-15204: Cross Site Scripting in SohuTV CacheCloud
Description
A vulnerability was determined in SohuTV CacheCloud up to 3.2.0. Affected is the function doQuartzList of the file src/main/java/com/sohu/cache/web/controller/QuartzManageController.java. Executing manipulation can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
CVE-2025-15204 is a cross-site scripting (XSS) vulnerability identified in SohuTV CacheCloud versions 3.0 through 3.2.0. The flaw exists in the doQuartzList function within the QuartzManageController.java source file, which is part of the web controller handling scheduled tasks. The vulnerability arises due to insufficient sanitization of user-supplied input that is reflected in the web interface, allowing an attacker to inject malicious JavaScript code. Exploitation requires the attacker to have high privileges (PR:H) but does not require authentication (AT:N) or confidentiality impact (VC:N). User interaction (UI:P) is necessary, meaning a victim must trigger the malicious payload, typically by visiting a crafted URL or interface. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L). Although the vendor was notified early, no patch or official response has been issued, and the exploit details have been publicly disclosed, increasing the risk of exploitation. While no known exploits are currently active in the wild, the public disclosure and lack of remediation elevate the threat level. The vulnerability primarily threatens the integrity of user sessions and could facilitate phishing or session hijacking attacks within the affected environment. The CVSS 4.8 score reflects a medium severity rating, balancing the ease of exploitation with limited impact on confidentiality and availability.
Potential Impact
For European organizations, the primary impact of CVE-2025-15204 lies in the potential compromise of user sessions and the integrity of web interactions within CacheCloud management interfaces. Organizations relying on CacheCloud for caching and task scheduling in media or content delivery environments may face risks of targeted XSS attacks that could lead to credential theft, session hijacking, or social engineering attacks against privileged users. Although the vulnerability does not directly affect data confidentiality or system availability, successful exploitation could enable attackers to perform unauthorized actions under the guise of legitimate users, potentially leading to further compromise. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple administrators or operators. The lack of vendor response and patch availability increases exposure time, necessitating proactive defensive measures. Additionally, organizations in regulated sectors must consider compliance implications related to the exploitation of such vulnerabilities.
Mitigation Recommendations
1. Restrict access to the CacheCloud management interface and specifically the doQuartzList function to trusted administrators only, using network segmentation and strong access controls. 2. Implement strict input validation and output encoding on all user-supplied data within the affected function to neutralize malicious scripts. 3. Deploy web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting CacheCloud endpoints. 4. Monitor logs and user activity for unusual patterns or repeated access attempts to the vulnerable function. 5. Educate privileged users about the risks of clicking on untrusted links and the importance of verifying URLs before interaction. 6. Consider temporary disabling or limiting the use of the affected functionality if feasible until an official patch is released. 7. Engage with the vendor or community to track patch releases or official mitigations. 8. Conduct regular security assessments and penetration tests focusing on web interface vulnerabilities in CacheCloud deployments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-28T10:16:54.470Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450a6db813ff03e2be2df
Added to database: 12/30/2025, 10:22:30 PM
Last enriched: 12/30/2025, 10:38:46 PM
Last updated: 2/4/2026, 2:19:55 AM
Views: 37
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.