Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15220: Cross Site Scripting in SohuTV CacheCloud

0
Medium
VulnerabilityCVE-2025-15220cvecve-2025-15220
Published: Tue Dec 30 2025 (12/30/2025, 04:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SohuTV
Product: CacheCloud

Description

A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. This affects the function init of the file src/main/java/com/sohu/cache/web/controller/LoginController.java. The manipulation results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 12/30/2025, 22:47:45 UTC

Technical Analysis

CVE-2025-15220 is a Cross Site Scripting (XSS) vulnerability identified in SohuTV CacheCloud versions 3.0 through 3.2.0. The flaw exists in the init function within the LoginController.java source file, where insufficient input sanitization allows an attacker to inject malicious JavaScript code. This vulnerability is remotely exploitable without requiring authentication, but it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The vulnerability can be leveraged to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, theft of sensitive information, or redirection to malicious sites. The vulnerability was responsibly disclosed to the vendor, but no patch or official response has been released as of the publication date. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the lack of required privileges and the potential impact on confidentiality and integrity, though availability is not affected. No known exploits are currently observed in the wild, but public exploit code exists, increasing the risk of exploitation. The vulnerability affects organizations using CacheCloud for caching or session management, especially those exposing login interfaces to the internet. Without vendor patches, mitigation relies on defensive coding practices, input validation, output encoding, and deployment of web application firewalls or content security policies to reduce attack surface.

Potential Impact

For European organizations, this XSS vulnerability poses risks primarily to the confidentiality and integrity of user sessions and data. Attackers exploiting this flaw can hijack user sessions, steal authentication tokens, or perform actions on behalf of users, potentially leading to unauthorized access or data leakage. Organizations using CacheCloud in customer-facing applications or internal portals are at risk of reputational damage, regulatory non-compliance (e.g., GDPR breaches if personal data is compromised), and operational disruption. The medium severity indicates that while the vulnerability is not critical, it can be leveraged in targeted phishing or social engineering campaigns to compromise users. The lack of vendor response and patch increases exposure duration, raising the likelihood of exploitation. European entities relying on Chinese software stacks or integrated systems that include CacheCloud should be particularly vigilant. The impact is heightened in sectors with sensitive data such as finance, healthcare, and government services.

Mitigation Recommendations

1. Immediately audit all CacheCloud deployments to identify affected versions (3.0 to 3.2.0). 2. Implement strict input validation and output encoding on all user inputs, especially those handled by the LoginController init function. 3. Deploy Web Application Firewalls (WAFs) configured to detect and block common XSS payloads targeting CacheCloud endpoints. 4. Apply Content Security Policy (CSP) headers to restrict execution of unauthorized scripts in browsers. 5. Educate users about phishing and social engineering risks to reduce the chance of interaction with malicious links. 6. Monitor logs for suspicious activity related to login pages and unusual script injections. 7. Consider isolating or restricting access to CacheCloud management interfaces to trusted networks. 8. Engage with the vendor or community for updates or unofficial patches and plan for upgrade once a fix is available. 9. As a temporary measure, disable or limit the vulnerable functionality if feasible. 10. Conduct penetration testing focused on XSS vectors to validate mitigation effectiveness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-28T15:51:31.359Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450aadb813ff03e2be6ae

Added to database: 12/30/2025, 10:22:34 PM

Last enriched: 12/30/2025, 10:47:45 PM

Last updated: 1/8/2026, 7:22:13 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats