Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4200: Server-Side Request Forgery in glowxq glowxq-oj

0
Medium
VulnerabilityCVE-2026-4200cvecve-2026-4200
Published: Mon Mar 16 2026 (03/16/2026, 00:02:49 UTC)
Source: CVE Database V5
Vendor/Project: glowxq
Product: glowxq-oj

Description

A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This affects the function uploadTestcaseZipUrl of the file business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 03/16/2026, 08:38:20 UTC

Technical Analysis

CVE-2026-4200 is a server-side request forgery vulnerability found in the glowxq-oj software, an online judge system developed by glowxq. The vulnerability exists in the uploadTestcaseZipUrl function within the ProblemCaseController.java source file. This function improperly handles user-supplied URLs when uploading test case ZIP files, allowing an attacker to craft malicious requests that cause the server to initiate HTTP requests to arbitrary destinations. SSRF vulnerabilities can be exploited to access internal services, bypass firewalls, or exfiltrate sensitive data. The flaw is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction needed, and limited impact on confidentiality, integrity, and availability. The vendor employs continuous delivery with rolling releases, complicating version tracking and patch management. Despite early notification, the vendor has not issued a response or patch, and public exploit code is available, which may facilitate attacks. No confirmed active exploitation has been reported yet, but the presence of public exploits elevates the threat level.

Potential Impact

The SSRF vulnerability in glowxq-oj can have significant impacts on organizations using this software. Attackers can leverage the flaw to make the server send crafted requests to internal or external systems, potentially accessing sensitive internal resources that are not directly exposed to the internet. This can lead to unauthorized information disclosure, such as internal metadata services or private APIs. Additionally, SSRF can be used as a pivot point to conduct further attacks within the internal network, including scanning, lateral movement, or exploitation of other vulnerabilities. The lack of authentication and user interaction requirements means attackers can exploit the vulnerability remotely and anonymously. Although the CVSS score is medium, the real-world impact depends on the internal network architecture and the sensitivity of accessible resources. Organizations relying on glowxq-oj for critical online judge or educational services may face service disruption, data leakage, or reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2026-4200, organizations should implement strict input validation and sanitization on the uploadTestcaseZipUrl function to ensure that only trusted URLs or local resources are accepted. Employ allowlisting of domains or IP addresses to restrict outbound requests initiated by the server. Network-level controls such as egress filtering and firewall rules should be enforced to prevent the server from making unauthorized requests to internal or sensitive endpoints. Deploy web application firewalls (WAFs) with rules to detect and block SSRF attack patterns targeting this endpoint. Monitor logs for unusual outbound requests originating from the glowxq-oj server. Since the vendor has not provided patches, organizations should consider isolating the glowxq-oj service in a segmented network zone with minimal privileges and no access to sensitive internal systems. Regularly review and update dependencies and monitor for vendor updates or community patches. If possible, disable or restrict the uploadTestcaseZipUrl functionality until a secure fix is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:36:29.050Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b7c1479d4df451833752e1

Added to database: 3/16/2026, 8:37:27 AM

Last enriched: 3/16/2026, 8:38:20 AM

Last updated: 3/16/2026, 8:53:56 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses