Plataforma
java
Componente
cachecloud
Corrigido em
3.0.1
3.1.1
3.2.1
CVE-2025-15173 describes a cross-site scripting (XSS) vulnerability affecting SohuTV CacheCloud versions 3.0 through 3.2.0. This flaw resides within the advancedAnalysis function of the InstanceController.java file, allowing remote attackers to inject malicious scripts. A public exploit is available, highlighting the potential for immediate exploitation. The vulnerability has been reported to the project, but no response has been received.
Successful exploitation of CVE-2025-15173 allows an attacker to inject arbitrary JavaScript code into the web application. This can lead to various malicious outcomes, including session hijacking, defacement of the CacheCloud interface, and redirection of users to phishing sites. The attacker could potentially steal sensitive information, such as user credentials or API keys, if they are handled within the application. Given the public availability of an exploit, the risk of immediate exploitation is significant. The blast radius extends to any user interacting with the vulnerable CacheCloud instance.
CVE-2025-15173 has been publicly disclosed and a proof-of-concept exploit is available, indicating a high probability of exploitation. The vulnerability is not currently listed on the CISA KEV catalog. The lack of a response from the project raises concerns about the timeliness of future security updates.
Organizations utilizing SohuTV CacheCloud in production environments, particularly those running versions 3.0 through 3.2.0, are at immediate risk. Shared hosting environments where CacheCloud is deployed alongside other applications are also vulnerable, as a successful exploit could potentially compromise the entire hosting infrastructure.
• java / server:
find /opt/sohutv/cachecloud/ -name "InstanceController.java"• generic web:
curl -I https://your-cachecloud-instance/advancedAnalysis?param=<script>alert('XSS')</script>• generic web:
grep -i 'advancedAnalysis' /var/log/apache2/access.logdisclosure
poc
Status do Exploit
EPSS
0.03% (percentil 9%)
CISA SSVC
Vetor CVSS
The primary mitigation for CVE-2025-15173 is to upgrade to version 3.2.1 or later, which contains the fix. If upgrading is not immediately feasible, consider implementing input validation and output encoding on user-supplied data within the advancedAnalysis function. Web application firewalls (WAFs) configured to detect and block XSS payloads can provide an additional layer of defense. Monitor access logs for suspicious requests containing JavaScript code or unusual URL parameters. After upgrading, confirm the fix by attempting to trigger the vulnerable endpoint with a known malicious payload and verifying that the script is not executed.
Actualice CacheCloud a una versión posterior a la 3.2.0 que corrija la vulnerabilidad XSS. Si no hay una versión disponible, revise y filtre las entradas del usuario en la función advancedAnalysis del archivo InstanceController.java para evitar la inyección de código malicioso.
Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.
CVE-2025-15173 is a cross-site scripting (XSS) vulnerability in SohuTV CacheCloud versions 3.0-3.2.0, allowing remote attackers to inject malicious scripts.
Yes, if you are using SohuTV CacheCloud versions 3.0, 3.1, or 3.2.0, you are vulnerable to this XSS attack.
Upgrade to version 3.2.1 or later to resolve the vulnerability. Consider input validation and WAF rules as temporary mitigations.
Yes, a public exploit is available, indicating a high probability of active exploitation.
As of this writing, no official advisory has been published by SohuTV. Monitor their website and security mailing lists for updates.
Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.
Envie seu arquivo pom.xml e descubra na hora se você está afetado.