Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4201: Unrestricted Upload in glowxq glowxq-oj

0
Medium
VulnerabilityCVE-2026-4201cvecve-2026-4201
Published: Mon Mar 16 2026 (03/16/2026, 00:32:43 UTC)
Source: CVE Database V5
Vendor/Project: glowxq
Product: glowxq-oj

Description

CVE-2026-4201 is a medium severity vulnerability in the glowxq-oj product that allows an attacker to perform unrestricted file uploads via the Upload function in SysFileController. java. This flaw can be exploited remotely without authentication or user interaction, enabling attackers to upload arbitrary files potentially leading to code execution or system compromise. The vulnerability affects the specific commit 6f7c723090472057252040fd2bbbdaa1b5ed2393, with no versioning available to distinguish affected releases. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are reported in the wild, public exploit code exists, increasing the risk of exploitation. Organizations using glowxq-oj should urgently review and restrict file upload functionality and monitor for suspicious activity. Countries with significant use of this software or strategic interest in related sectors are at higher risk.

AI-Powered Analysis

AILast updated: 03/16/2026, 01:20:22 UTC

Technical Analysis

CVE-2026-4201 is a vulnerability identified in the glowxq-oj product, specifically in the Upload function implemented in the SysFileController.java file. The vulnerability arises from insufficient validation or restrictions on file uploads, allowing an attacker to upload arbitrary files without any authentication or user interaction. This unrestricted upload capability can be exploited remotely, potentially enabling attackers to upload malicious files such as web shells or scripts that could lead to remote code execution, data compromise, or further system infiltration. The affected version is identified by a specific commit hash (6f7c723090472057252040fd2bbbdaa1b5ed2393), but due to the lack of versioning in the product, it is difficult to determine the full scope of affected deployments. The vendor was contacted but did not respond, and no official patches or mitigations have been released. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation (no authentication or user interaction required) but limited scope of impact due to the need for specific conditions to achieve full compromise. Public exploit code is available, increasing the likelihood of exploitation attempts. The vulnerability does not require privileges or user interaction, making it a significant risk for exposed installations. The lack of versioning and vendor response complicates mitigation and detection efforts.

Potential Impact

The unrestricted file upload vulnerability in glowxq-oj can have serious consequences for organizations using this software. Attackers can remotely upload malicious files that may lead to remote code execution, allowing full system compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of services, and potential lateral movement within networks. The absence of authentication and user interaction requirements lowers the barrier for exploitation, increasing the risk of automated attacks. Organizations relying on glowxq-oj for critical business functions or hosting sensitive data face heightened risks of operational disruption and reputational damage. The lack of vendor response and patches further exacerbates the threat, as organizations must rely on their own mitigations. The availability of public exploit code increases the likelihood of widespread exploitation attempts, especially targeting internet-facing instances. Overall, this vulnerability poses a moderate to high risk depending on deployment context and exposure.

Mitigation Recommendations

Given the lack of official patches, organizations should implement immediate compensating controls to mitigate this vulnerability. First, restrict access to the Upload function by enforcing network-level controls such as IP whitelisting or VPN-only access to reduce exposure. Implement strict input validation and file type restrictions at the application or web server level to block potentially dangerous file types (e.g., executable scripts, web shells). Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts. Monitor logs for unusual upload activity or unexpected file types. If possible, isolate the glowxq-oj application environment to limit the impact of a successful exploit. Conduct thorough code reviews to add validation and authentication checks around file uploads. Consider disabling the upload functionality temporarily if not essential. Maintain regular backups and have an incident response plan ready in case of compromise. Engage with the vendor or community for updates and patches. Finally, track threat intelligence sources for emerging exploit trends related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-15T08:36:34.330Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b757769d4df45183ae649a

Added to database: 3/16/2026, 1:05:58 AM

Last enriched: 3/16/2026, 1:20:22 AM

Last updated: 3/16/2026, 5:31:07 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses