CVE-2025-15172
Cross-Site Scripting in SohuTV CacheCloud RedisConfigTemplateController
Publication date: 2025-12-29
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sohutv | cachecloud | 3.2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a security flaw in SohuTV CacheCloud up to version 3.2.0, specifically in the preview function of the RedisConfigTemplateController.java file. It allows an attacker to perform cross-site scripting (XSS) attacks remotely by manipulating this function.
How can this vulnerability impact me? :
The vulnerability can allow remote attackers to execute cross-site scripting attacks, which may lead to the injection of malicious scripts into web pages viewed by other users. This can result in unauthorized actions, data manipulation, or theft of sensitive information.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the `/manage/redisConfig/preview` endpoint of SohuTV CacheCloud (up to version 3.2.0) for reflected Cross-Site Scripting (XSS). A common detection method is to send HTTP requests with payloads containing script tags in parameters such as `host`, `type`, or others used by the preview function, and observe if the payload is reflected unsanitized in the response. For example, using curl or similar tools, you can send a POST request with a payload like `<script>alert(1)</script>` in the `host` parameter and check if the script executes or appears in the response. A sample command to test might be: curl -X POST -d "host=<script>alert(1)</script>&type=common" https://[target]/manage/redisConfig/preview -v If the response contains the script tag unencoded, the vulnerability is present. Automated scanners or custom scripts can also be used to detect this reflected XSS by injecting typical XSS payloads into the parameters of the preview endpoint and analyzing the responses. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1. Avoid using the vulnerable version (up to 3.2.0) of SohuTV CacheCloud if possible; consider replacing it with an alternative product or version without this vulnerability. 2. If replacement or upgrade is not immediately possible, restrict access to the `/manage/redisConfig/preview` endpoint to trusted users only, for example by network segmentation or access control. 3. Implement web application firewall (WAF) rules to detect and block typical XSS payloads targeting this endpoint. 4. Educate users to be cautious when interacting with this functionality, as exploitation requires user interaction. 5. Monitor for exploitation attempts using logs and intrusion detection systems. Currently, no official patches or fixes have been provided by the project, so these steps are critical to reduce risk until a fix is available. [1, 3]