Description
A security flaw has been discovered in SohuTV CacheCloud up to 3.2.0. This impacts the function preview of the file src/main/java/com/sohu/cache/web/controller/RedisConfigTemplateController.java. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be exploited. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
3.1
3.2.0
Timeline
| 2025-12-28: | Advisory disclosed |
| 2025-12-28: | VulDB entry created |
| 2025-12-28: | VulDB entry last update |
Credits
ZAST.AI (VulDB User)
References
vuldb.com/?id.338557 (VDB-338557 | SohuTV CacheCloud RedisConfigTemplateController.java preview cross site scripting)
vuldb.com/?ctiid.338557 (VDB-338557 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.716306 (Submit #716306 | SohuTV CacheCloud <=3.2.0 Reflected XSS)
github.com/sohutv/cachecloud/issues/368
github.com/sohutv/cachecloud/issues/368
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.