Platform
java
Component
cachecloud
Opgelost in
3.0.1
3.1.1
3.2.1
CVE-2025-15203 describes a cross-site scripting (XSS) vulnerability discovered in SohuTV CacheCloud versions 3.0 through 3.2.0. Successful exploitation could allow an attacker to inject malicious scripts into web pages viewed by other users, potentially leading to session hijacking or defacement. A fix is available in version 3.2.1, and a public exploit has been released.
This XSS vulnerability resides within the ResourceController.java file's index function. An attacker can manipulate input to inject arbitrary JavaScript code, which will then be executed in the context of the victim's browser. This could allow for the theft of session cookies, redirection to malicious websites, or modification of the website's content. The public availability of an exploit significantly increases the risk of exploitation, as it lowers the barrier to entry for attackers.
This vulnerability has been publicly disclosed and a proof-of-concept exploit is available, indicating a higher probability of exploitation. The CVE was published on 2025-12-29. The vendor has not yet responded to the issue report, which could delay further mitigation efforts. The CVSS score is 2.4 (LOW), reflecting the relatively limited impact and ease of exploitation.
Organizations utilizing SohuTV CacheCloud in versions 3.0 through 3.2.0 are at risk, particularly those with publicly accessible instances. Shared hosting environments where CacheCloud is deployed could expose multiple users to the vulnerability.
• java / server:
find /opt/sohutv/cachecloud/ -name "ResourceController.java"• generic web:
curl -I https://your-cachecloud-instance/resource/index | grep -i 'X-XSS-Protection'• generic web:
grep -i "<script" /var/log/apache2/access.logdisclosure
poc
Exploit Status
EPSS
0.04% (11% percentiel)
CISA SSVC
CVSS-vector
The primary mitigation for CVE-2025-15203 is to upgrade to SohuTV CacheCloud version 3.2.1 or later. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the affected ResourceController.java index function to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Review access logs for suspicious activity and unusual requests targeting the vulnerable endpoint.
Actualizar CacheCloud a una versión posterior a 3.2.0, si existe, que corrija la vulnerabilidad de Cross-Site Scripting (XSS). Si no hay una versión disponible, revisar y sanitizar las entradas del usuario en el archivo src/main/java/com/sohu/cache/web/controller/ResourceController.java, específicamente en la función index, para evitar la inyección de código malicioso.
Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.
CVE-2025-15203 is a cross-site scripting vulnerability affecting SohuTV CacheCloud versions 3.0-3.2.0, allowing attackers to inject malicious scripts via manipulation of the index function.
You are affected if you are using SohuTV CacheCloud versions 3.0, 3.1, or 3.2.0. Upgrade to 3.2.1 or later to mitigate the risk.
Upgrade to SohuTV CacheCloud version 3.2.1 or later. As a temporary measure, implement input validation and output encoding.
Yes, a public proof-of-concept exploit is available, indicating a potential for active exploitation.
As of the current date, there is no official advisory from SohuTV. Monitor their website and security mailing lists for updates.
Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.
Upload je pom.xml-bestand en we vertellen je direct of je getroffen bent.