CVE-2025-15221
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into SohuTV CacheCloud web interfaces through the AppDataMigrateController. When users view affected pages, these scripts execute in their browsers, potentially stealing session cookies or performing actions on their behalf. Organizations using CacheCloud versions up to 3.2.0 are affected.
💻 Affected Systems
- SohuTV CacheCloud
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, hijack user sessions, deface the application, or redirect users to malicious sites, potentially leading to complete system compromise.
Likely Case
Session hijacking, credential theft, or defacement of the CacheCloud web interface by injecting malicious JavaScript payloads.
If Mitigated
Limited impact with proper input validation and output encoding, potentially only affecting users who directly interact with maliciously crafted URLs.
🎯 Exploit Status
The exploit has been published and remote exploitation is possible. Attackers can craft malicious URLs containing JavaScript payloads.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch is available. Monitor the GitHub repository for updates: https://github.com/sohutv/cachecloud/issues/380
🔧 Temporary Workarounds
Implement Web Application Firewall (WAF)
allDeploy a WAF with XSS protection rules to block malicious payloads before they reach the application.
Input Validation and Output Encoding
allManually implement proper input validation and output encoding in the affected controller to sanitize user input.
🧯 If You Can't Patch
- Restrict access to CacheCloud web interface to trusted networks only using firewall rules.
- Implement Content Security Policy (CSP) headers to mitigate script injection impact.
🔍 How to Verify
Check if Vulnerable:
Check if CacheCloud version is 3.2.0 or earlier. Review the AppDataMigrateController.java file for lack of input sanitization in the index function.
Check Version:
Check application configuration files or deployment manifests for version information.
Verify Fix Applied:
Test the application with XSS payloads in the affected endpoint to ensure they are properly sanitized or blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript patterns in URL parameters
- Multiple requests with script tags or JavaScript functions in query strings
Network Indicators:
- HTTP requests containing <script> tags or JavaScript functions in URL parameters to CacheCloud endpoints
SIEM Query:
Search for web logs containing patterns like *<script>* or *javascript:* in URL parameters targeting CacheCloud endpoints.