Vulnerability Description
A weakness has been identified in SohuTV CacheCloud up to 3.2.0. Affected is the function advancedAnalysis of the file src/main/java/com/sohu/cache/web/controller/InstanceController.java. This manipulation causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sohu | Cachecloud | <= 3.2 |
Related Weaknesses (CWE)
References
- https://github.com/sohutv/cachecloud/issues/369ExploitIssue TrackingVendor Advisory
- https://github.com/sohutv/cachecloud/issues/369#issue-3733560985ExploitIssue TrackingVendor Advisory
- https://vuldb.com/?ctiid.338558Permissions RequiredVDB Entry
- https://vuldb.com/?id.338558Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.716307Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-15173?
CVE-2025-15173 is a vulnerability with a CVSS score of 3.5 (LOW). A weakness has been identified in SohuTV CacheCloud up to 3.2.0. Affected is the function advancedAnalysis of the file src/main/java/com/sohu/cache/web/controller/InstanceController.java. This manipul...
How severe is CVE-2025-15173?
CVE-2025-15173 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15173?
Check the references section above for vendor advisories and patch information. Affected products include: Sohu Cachecloud.