Description
A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. The affected element is the function getExceptionStatisticsByClient/getCommandStatisticsByClient/doIndex of the file src/main/java/com/sohu/cache/web/controller/AppClientDataShowController.java. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
https://github.com/sohutv/cachecloud/issues/372
https://github.com/sohutv/cachecloud/issues/382
https://vuldb.com/?ctiid.338587
https://vuldb.com/?submit.716311
https://vuldb.com/?submit.716323
https://vuldb.com/?submit.716324
https://github.com/sohutv/cachecloud/issues/372
https://github.com/sohutv/cachecloud/issues/382
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
2.4 · Low
Information
Source identifier
Vulnerability status
Analyzed
Published
2025-12-29T19:15:56.187Z
2 weeks agoLast modified
2026-01-06T21:38:31.767Z
1 week ago