Description


A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. The affected element is the function getExceptionStatisticsByClient/getCommandStatisticsByClient/doIndex of the file src/main/java/com/sohu/cache/web/controller/AppClientDataShowController.java. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Related CPE's


Vulnerable

References


https://github.com/sohutv/cachecloud/issues/372

ExploitIssue TrackingVendor Advisory

https://github.com/sohutv/cachecloud/issues/382

ExploitIssue TrackingVendor Advisory

https://vuldb.com/?ctiid.338587

Permissions RequiredVDB Entry

https://vuldb.com/?id.338587

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.716311

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.716323

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.716324

Third Party AdvisoryVDB Entry

https://github.com/sohutv/cachecloud/issues/372

ExploitIssue TrackingVendor Advisory

https://github.com/sohutv/cachecloud/issues/382

ExploitIssue TrackingVendor Advisory

Weaknesses



CWE-79CWE-94

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

2.4 · Low

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2025-12-29T19:15:56.187Z

2 weeks ago

Last modified

2026-01-06T21:38:31.767Z

1 week ago