HIGHCVE-2026-4200CVSS 7.3

glowxq glowxq-oj ProblemCaseController.java uploadTestcaseZipUrl server-side request forgery

wordt vertaald…

Platform

java

Component

glowxq-oj

Opgelost in

6.0.1

AI Confidence: highNVDEPSS 0.1%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

A server-side request forgery (SSRF) vulnerability has been identified in glowxq glowxq-oj, affecting versions up to 6f7c723090472057252040fd2bbbdaa1b5ed2393. This flaw resides within the uploadTestcaseZipUrl function, allowing attackers to potentially manipulate server requests. Due to the product's continuous delivery model, specific affected and updated versions are not readily available. Immediate attention and mitigation are crucial.

Java / Maven

Detecteer deze CVE in je project

Upload je pom.xml-bestand en we vertellen je direct of je getroffen bent.

pom.xml uploadenOndersteunde formaten: pom.xml · build.gradle

Impact en Aanvalsscenarioswordt vertaald…

The SSRF vulnerability in glowxq-oj allows an attacker to craft malicious requests that the server will execute on its behalf. This can lead to unauthorized access to internal resources, such as internal APIs, databases, or cloud services that are not directly accessible from the outside world. An attacker could potentially read sensitive data, modify configurations, or even gain a foothold within the internal network. The availability of a public exploit significantly elevates the risk, as it lowers the barrier to entry for malicious actors. The impact is amplified if the glowxq-oj instance is exposed to the internet or interacts with other sensitive systems.

Uitbuitingscontextwordt vertaald…

This vulnerability has been publicly disclosed and a proof-of-concept exploit is available, indicating a high probability of exploitation. The vulnerability is not currently listed on CISA KEV, but the public availability of the exploit warrants close monitoring. Attackers may leverage the exploit to gain unauthorized access to internal resources and potentially compromise the entire system. The rapid release of the exploit suggests that attackers are actively targeting this vulnerability.

Wie Loopt Risicowordt vertaald…

Organizations utilizing glowxq-oj in production environments, particularly those with continuous delivery pipelines, are at risk. Environments with limited network segmentation or exposed internal services are especially vulnerable. Shared hosting environments where multiple users share the same glowxq-oj instance also face increased risk.

Detectiestappenwordt vertaald…

• java / server:

# Monitor for suspicious outbound requests to internal resources
grep -i "internal.example.com" /var/log/access.log

• generic web:

# Check for unusual HTTP requests in access logs
curl -I <glowxq-oj_url>/business/business-oj/src/main/java/com/glowxq/oj/problem/controller/ProblemCaseController.java | grep -i "Server:"

Aanvalstijdlijn

  1. Disclosure

    disclosure

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

0.05% (15% percentiel)

CISA SSVC

Exploitatiepoc
Automatiseerbaaryes
Technische Impactpartial

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R7.3HIGHAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityLowRisico op blootstelling van gevoelige dataIntegrityLowRisico op ongeautoriseerde gegevenswijzigingAvailabilityLowRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Laag — gedeeltelijke toegang tot enkele gegevens.
Integrity
Laag — aanvaller kan enkele gegevens met beperkte omvang aanpassen.
Availability
Laag — gedeeltelijke of intermitterende denial of service.

Getroffen Software

Componentglowxq-oj
Leverancierglowxq
Getroffen bereikOpgelost in
6f7c723090472057252040fd2bbbdaa1b5ed2393 – 6f7c723090472057252040fd2bbbdaa1b5ed23936.0.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. EPSS bijgewerkt
Geen patch — 69 dagen na openbaarmaking

Mitigatie en Workaroundswordt vertaald…

Given the continuous delivery model of glowxq-oj, traditional version-based patching is not applicable. The primary mitigation strategy is to immediately upgrade to the latest available release. Implement strict input validation on all user-supplied data, particularly URLs, to prevent malicious manipulation. Consider deploying a Web Application Firewall (WAF) with SSRF protection rules to filter out potentially harmful requests. Restrict network access to the glowxq-oj instance to only necessary ports and services. After upgrading, verify the fix by attempting to trigger the SSRF vulnerability with a known malicious URL and confirming that the request is blocked or handled safely.

Hoe te verhelpenwordt vertaald…

Actualizar a una versión corregida que mitigue la vulnerabilidad de Server-Side Request Forgery (SSRF). Dado que no hay una versión específica corregida disponible, se recomienda contactar al proveedor para obtener una solución o aplicar medidas de seguridad adicionales para prevenir ataques SSRF.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2026-4200 — SSRF in glowxq-oj?

CVE-2026-4200 is a server-side request forgery vulnerability in glowxq-oj versions up to 6f7c723090472057252040fd2bbbdaa1b5ed2393, allowing attackers to manipulate server requests and potentially access internal resources.

Am I affected by CVE-2026-4200 in glowxq-oj?

If you are using glowxq-oj versions up to 6f7c723090472057252040fd2bbbdaa1b5ed2393, you are potentially affected by this SSRF vulnerability. Due to the continuous delivery model, confirm with the vendor for the latest release.

How do I fix CVE-2026-4200 in glowxq-oj?

Upgrade to the latest available release of glowxq-oj as soon as possible. Implement input validation and consider using a WAF with SSRF protection.

Is CVE-2026-4200 being actively exploited?

Yes, a public exploit is available, indicating active exploitation is likely and increasing the risk.

Where can I find the official glowxq-oj advisory for CVE-2026-4200?

Consult the glowxq-oj official website or communication channels for the latest advisory regarding CVE-2026-4200.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.