CVE-2026-4200 PUBLISHED

glowxq glowxq-oj ProblemCaseController.java uploadTestcaseZipUrl server-side request forgery

Assigner: VulDB
Reserved: 15.03.2026 Published: 16.03.2026 Updated: 16.03.2026

A security flaw has been discovered in glowxq glowxq-oj up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This affects the function uploadTestcaseZipUrl of the file business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java. Performing a manipulation results in server-side request forgery. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor glowxq
Product glowxq-oj
Versions
  • Version 6f7c723090472057252040fd2bbbdaa1b5ed2393 is affected

Credits

  • xcxr (VulDB User) reporter
  • VulDB coordinator

References

Problem Types

  • Server-Side Request Forgery CWE