CVE-2026-4200: Server-Side Request Forgery in glowxq glowxq-oj
A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This affects the function uploadTestcaseZipUrl of the file business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-4200 is a server-side request forgery vulnerability found in the glowxq-oj software, an online judge system developed by glowxq. The vulnerability exists in the uploadTestcaseZipUrl function within the ProblemCaseController.java source file. This function improperly handles user-supplied URLs when uploading test case ZIP files, allowing an attacker to craft malicious requests that cause the server to initiate HTTP requests to arbitrary destinations. SSRF vulnerabilities can be exploited to access internal services, bypass firewalls, or exfiltrate sensitive data. The flaw is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. The vendor employs continuous delivery with rolling releases, complicating version tracking and patch management. Despite early notification, the vendor has not issued a response or patch, and public exploit code is available, which may facilitate attacks. No confirmed active exploitation has been reported yet, but the presence of public exploits elevates the threat level.
Potential Impact
The SSRF vulnerability in glowxq-oj can have significant impacts on organizations using this software. Attackers can leverage the flaw to make the server send crafted requests to internal or external systems, potentially accessing sensitive internal resources that are not directly exposed to the internet. This can lead to unauthorized information disclosure, such as internal metadata services or private APIs. Additionally, SSRF can be used as a pivot point to conduct further attacks within the internal network, including scanning, lateral movement, or exploitation of other vulnerabilities. The lack of authentication and user interaction requirements means attackers can exploit the vulnerability remotely and anonymously. Although the CVSS score is medium, the real-world impact depends on the internal network architecture and the sensitivity of accessible resources. Organizations relying on glowxq-oj for critical online judge or educational services may face service disruption, data leakage, or reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2026-4200, organizations should implement strict input validation and sanitization on the uploadTestcaseZipUrl function to ensure that only trusted URLs or local resources are accepted. Employ allowlisting of domains or IP addresses to restrict outbound requests initiated by the server. Network-level controls such as egress filtering and firewall rules should be enforced to prevent the server from making unauthorized requests to internal or sensitive endpoints. Deploy web application firewalls (WAFs) with rules to detect and block SSRF attack patterns targeting this endpoint. Monitor logs for unusual outbound requests originating from the glowxq-oj server. Since the vendor has not provided patches, organizations should consider isolating the glowxq-oj service in a segmented network zone with minimal privileges and no access to sensitive internal systems. Regularly review and update dependencies and monitor for vendor updates or community patches. If possible, disable or restrict the uploadTestcaseZipUrl functionality until a secure fix is available.
Affected Countries
United States, China, India, Germany, United Kingdom, Japan, South Korea, France, Canada, Australia
CVE-2026-4200: Server-Side Request Forgery in glowxq glowxq-oj
Description
A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This affects the function uploadTestcaseZipUrl of the file business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-4200 is a server-side request forgery vulnerability found in the glowxq-oj software, an online judge system developed by glowxq. The vulnerability exists in the uploadTestcaseZipUrl function within the ProblemCaseController.java source file. This function improperly handles user-supplied URLs when uploading test case ZIP files, allowing an attacker to craft malicious requests that cause the server to initiate HTTP requests to arbitrary destinations. SSRF vulnerabilities can be exploited to access internal services, bypass firewalls, or exfiltrate sensitive data. The flaw is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. The vendor employs continuous delivery with rolling releases, complicating version tracking and patch management. Despite early notification, the vendor has not issued a response or patch, and public exploit code is available, which may facilitate attacks. No confirmed active exploitation has been reported yet, but the presence of public exploits elevates the threat level.
Potential Impact
The SSRF vulnerability in glowxq-oj can have significant impacts on organizations using this software. Attackers can leverage the flaw to make the server send crafted requests to internal or external systems, potentially accessing sensitive internal resources that are not directly exposed to the internet. This can lead to unauthorized information disclosure, such as internal metadata services or private APIs. Additionally, SSRF can be used as a pivot point to conduct further attacks within the internal network, including scanning, lateral movement, or exploitation of other vulnerabilities. The lack of authentication and user interaction requirements means attackers can exploit the vulnerability remotely and anonymously. Although the CVSS score is medium, the real-world impact depends on the internal network architecture and the sensitivity of accessible resources. Organizations relying on glowxq-oj for critical online judge or educational services may face service disruption, data leakage, or reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2026-4200, organizations should implement strict input validation and sanitization on the uploadTestcaseZipUrl function to ensure that only trusted URLs or local resources are accepted. Employ allowlisting of domains or IP addresses to restrict outbound requests initiated by the server. Network-level controls such as egress filtering and firewall rules should be enforced to prevent the server from making unauthorized requests to internal or sensitive endpoints. Deploy web application firewalls (WAFs) with rules to detect and block SSRF attack patterns targeting this endpoint. Monitor logs for unusual outbound requests originating from the glowxq-oj server. Since the vendor has not provided patches, organizations should consider isolating the glowxq-oj service in a segmented network zone with minimal privileges and no access to sensitive internal systems. Regularly review and update dependencies and monitor for vendor updates or community patches. If possible, disable or restrict the uploadTestcaseZipUrl functionality until a secure fix is available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-15T08:36:29.050Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b7c1479d4df451833752e1
Added to database: 3/16/2026, 8:37:27 AM
Last enriched: 3/16/2026, 8:38:20 AM
Last updated: 3/16/2026, 8:53:56 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.