CVE-2025-15175

Source
https://cve.org/CVERecord?id=CVE-2025-15175
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15175.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15175
Published
2025-12-29T06:15:52.350Z
Modified
2026-03-15T22:50:24.209962Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. Affected by this issue is the function doAppList/appCommandAnalysis of the file src/main/java/com/sohu/cache/web/controller/AppController.java. Performing manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

References

Affected packages

Git / github.com/sohutv/cachecloud

Affected ranges

Type
GIT
Repo
https://github.com/sohutv/cachecloud
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "3.2"
        }
    ]
}

Affected versions

1.*
1.0
1.1
1.2
2.*
2.0
2.1
2.2
3.*
3.0
3.1
3.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15175.json"