CVE-2025-15172
Unknown Unknown - Not Provided
Cross-Site Scripting in SohuTV CacheCloud RedisConfigTemplateController

Publication date: 2025-12-29

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in SohuTV CacheCloud up to 3.2.0. This impacts the function preview of the file src/main/java/com/sohu/cache/web/controller/RedisConfigTemplateController.java. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be exploited. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-29
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sohutv cachecloud 3.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a security flaw in SohuTV CacheCloud up to version 3.2.0, specifically in the preview function of the RedisConfigTemplateController.java file. It allows an attacker to perform cross-site scripting (XSS) attacks remotely by manipulating this function.


How can this vulnerability impact me? :

The vulnerability can allow remote attackers to execute cross-site scripting attacks, which may lead to the injection of malicious scripts into web pages viewed by other users. This can result in unauthorized actions, data manipulation, or theft of sensitive information.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the `/manage/redisConfig/preview` endpoint of SohuTV CacheCloud (up to version 3.2.0) for reflected Cross-Site Scripting (XSS). A common detection method is to send HTTP requests with payloads containing script tags in parameters such as `host`, `type`, or others used by the preview function, and observe if the payload is reflected unsanitized in the response. For example, using curl or similar tools, you can send a POST request with a payload like `<script>alert(1)</script>` in the `host` parameter and check if the script executes or appears in the response. A sample command to test might be: curl -X POST -d "host=<script>alert(1)</script>&type=common" https://[target]/manage/redisConfig/preview -v If the response contains the script tag unencoded, the vulnerability is present. Automated scanners or custom scripts can also be used to detect this reflected XSS by injecting typical XSS payloads into the parameters of the preview endpoint and analyzing the responses. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Avoid using the vulnerable version (up to 3.2.0) of SohuTV CacheCloud if possible; consider replacing it with an alternative product or version without this vulnerability. 2. If replacement or upgrade is not immediately possible, restrict access to the `/manage/redisConfig/preview` endpoint to trusted users only, for example by network segmentation or access control. 3. Implement web application firewall (WAF) rules to detect and block typical XSS payloads targeting this endpoint. 4. Educate users to be cautious when interacting with this functionality, as exploitation requires user interaction. 5. Monitor for exploitation attempts using logs and intrusion detection systems. Currently, no official patches or fixes have been provided by the project, so these steps are critical to reduce risk until a fix is available. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart