Description


A vulnerability was found in SohuTV CacheCloud up to 3.2.0. This impacts the function index of the file src/main/java/com/sohu/cache/web/controller/ResourceController.java. Performing manipulation results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The project was informed of the problem early through an issue report but has not responded yet.

Related CPE's


Vulnerable

References


https://github.com/sohutv/cachecloud/issues/375

ExploitIssue TrackingVendor Advisory

https://vuldb.com/?ctiid.338590

Permissions RequiredVDB Entry

https://vuldb.com/?id.338590

Third Party AdvisoryVDB Entry

https://vuldb.com/?submit.716314

Third Party AdvisoryVDB Entry

https://github.com/sohutv/cachecloud/issues/375

ExploitIssue TrackingVendor Advisory

Weaknesses



CWE-79CWE-94

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N

2.4 · Low

Information


Source identifier

[email protected]

Vulnerability status

Analyzed

Published

2025-12-29T20:15:41.920Z

2 weeks ago

Last modified

2026-01-06T21:36:04.247Z

1 week ago