Impact
A vulnerability in the glowxq‑oj ProblemCaseController.uploadTestcaseZipUrl method allows an attacker to supply a manipulated URL that the server will fetch, enabling server‑side request forgery (CWE‑918). The flaw can lead to the server making arbitrary HTTP or HTTPS requests to internal or external resources, potentially exposing sensitive internal data or providing a foothold for further attacks, but it is not a direct remote code execution vector.
Affected Systems
All released versions of glowxq‑oj up to commit 6f7c723090472057252040fd2bbbdaa1b5ed2393 are affected. No specific patch or fixed release is available and continuous delivery with rolling releases means newer commits may also contain the flaw until a remedial release is issued.
Risk and Exploitability
The CVSS v3.1 base score of 6.9 indicates moderate severity. The EPSS score is below 1 %, indicating a currently low likelihood of exploitation, although an exploit has been publicly released. The vulnerability is not listed in CISA's KEV catalog. Attackers can trigger the flaw remotely by sending crafted requests to the vulnerable endpoint.
OpenCVE Enrichment