CVE-2025-15201
Remote XSS in SohuTV CacheCloud redirectNoPower Function
Publication date: 2025-12-29
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sohutv | cachecloud | 3.2.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted HTTP requests to the vulnerable endpoint `/web/resource/noPower` with malicious payloads in the `appId` parameter and observing if the response reflects the injected script without proper encoding. A proof-of-concept uses Python's requests library to send a POST request with a script tag payload in `appId`. For detection, you can use curl or similar tools to send a request like: curl -X POST 'http://<target>/web/resource/noPower' -d 'appId=<script>alert(1)</script>' Then check if the response contains the injected script tag unencoded, indicating vulnerability. [1]
Can you explain this vulnerability to me?
This vulnerability is a flaw in SohuTV CacheCloud up to version 3.2.0, specifically in the function redirectNoPower within the WebResourceController.java file. It allows an attacker to perform a cross-site scripting (XSS) attack remotely by manipulating this function.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute cross-site scripting attacks remotely, which may lead to the injection of malicious scripts into web pages viewed by other users. This can result in limited integrity impact, such as unauthorized script execution, potentially affecting user interactions or data.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding use of the vulnerable CacheCloud version 3.2.0 or earlier, restricting access to the vulnerable endpoint `/web/resource/noPower`, and implementing input validation or output encoding on the `appId` parameter to prevent script injection. Since no official patches or vendor responses are available yet, consider replacing the affected component with an alternative product or applying web application firewall (WAF) rules to block malicious payloads targeting this endpoint. [2]