平台
java
组件
cachecloud
修复版本
3.0.1
3.1.1
3.2.1
CVE-2025-15175 describes a cross-site scripting (XSS) vulnerability discovered in SohuTV CacheCloud versions 3.0 through 3.2.0. This flaw allows attackers to inject malicious scripts into the application, potentially leading to data theft or session hijacking. A fix is available in version 3.2.1, and a public exploit has been released, indicating a heightened risk.
The XSS vulnerability in CacheCloud allows an attacker to execute arbitrary JavaScript code within the context of a user's browser. This can be leveraged to steal session cookies, redirect users to malicious websites, or deface the application. Given the public availability of an exploit, the risk of exploitation is significant. An attacker could potentially gain unauthorized access to sensitive data or compromise the entire CacheCloud deployment. The impact is amplified if CacheCloud is used to manage or cache sensitive user data.
CVE-2025-15175 has a LOW CVSS score and is currently considered to be actively exploited due to the public availability of a proof-of-concept. While the impact is primarily XSS, the ease of exploitation makes it a concern. The vulnerability was reported to the project but has not yet received a response, potentially indicating a lack of active maintenance. No KEV listing is currently available.
Organizations utilizing SohuTV CacheCloud versions 3.0 through 3.2.0 are at risk, particularly those deploying CacheCloud in environments handling sensitive user data. Shared hosting environments where CacheCloud is installed could be vulnerable if other tenants can influence requests to the /appCommandAnalysis endpoint.
• java / server: Monitor application logs for suspicious requests to /appCommandAnalysis. Use a WAF to block requests containing potentially malicious JavaScript code.
grep -i 'script' /var/log/app/cachecloud.log• generic web: Use curl to test the /appCommandAnalysis endpoint with a simple XSS payload (e.g., `<script>alert(1)</script>). Verify that the payload is properly encoded or sanitized.
curl -X POST -d '<script>alert(1)</script>' http://your-cachecloud-server/appCommandAnalysisdisclosure
poc
漏洞利用状态
EPSS
0.02% (6% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2025-15175 is to upgrade to CacheCloud version 3.2.1 or later, which contains the fix. If immediate upgrading is not possible, consider implementing input validation and output encoding on the doAppList/appCommandAnalysis endpoint to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Monitor application logs for suspicious activity, particularly requests targeting the vulnerable endpoint. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple XSS payload through the doAppList/appCommandAnalysis endpoint and verifying that the payload is properly sanitized.
Actualice CacheCloud a una versión posterior a la 3.2.0, si está disponible, que corrija la vulnerabilidad de cross-site scripting. Si no hay una versión corregida disponible, revise y sanitize las entradas de usuario en la función doAppList/appCommandAnalysis del archivo AppController.java para prevenir la inyección de código malicioso.
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2025-15175 is a cross-site scripting (XSS) vulnerability affecting SohuTV CacheCloud versions 3.0-3.2.0, allowing attackers to inject malicious scripts.
You are affected if you are using SohuTV CacheCloud versions 3.0, 3.1, or 3.2.0. Upgrade to 3.2.1 or later to mitigate the risk.
Upgrade to SohuTV CacheCloud version 3.2.1 or later. Implement input validation and output encoding as a temporary workaround.
Yes, a public exploit is available, indicating that CVE-2025-15175 is potentially being actively exploited.
As of the current date, there is no official advisory from SohuTV regarding this vulnerability. Monitor their website and security mailing lists for updates.
上传你的 pom.xml 文件,立即知道是否受影响。