Description
A vulnerability was detected in SohuTV CacheCloud up to 3.2.0. This affects the function init of the file src/main/java/com/sohu/cache/web/controller/LoginController.java. The manipulation results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
https://github.com/sohutv/cachecloud/issues/379
ExploitIssue TrackingVendor Advisory
https://vuldb.com/?ctiid.338605
Permissions RequiredVDB Entry
Third Party AdvisoryVDB Entry
https://vuldb.com/?submit.716320
Third Party AdvisoryVDB Entry
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 · Medium
Information
Source identifier
Vulnerability status
Analyzed
Published
2025-12-30T05:16:00.933Z
2 weeks agoLast modified
2026-01-06T21:32:55.663Z
1 week ago