Description
A vulnerability was detected in QingdaoU OnlineJudge up to 1.6.1. Affected by this issue is the function service_url of the file JudgeServer.service_url of the component judge_server_heartbeat Endpoint. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

A Server‑Side Request Forgery vulnerability exists in the judge_server_heartbeat service_url function of QingdaoU OnlineJudge, allowing an attacker to instruct the server to make arbitrary HTTP requests on its behalf. The vulnerability can be triggered remotely, enabling potential internal network discovery, data exfiltration, or malicious interactions with other services, thereby compromising confidentiality and possibly availability. The weakness aligns with CWE‑918, a well‑known SSRF flaw.

Affected Systems

QingdaoU OnlineJudge versions up to and including 1.6.1 are affected. Users running this or earlier releases are susceptible to the SSRF attack via the service_url endpoint of the judge_server_heartbeat module.

Risk and Exploitability

The reported CVSS v3 score of 5.3 indicates moderate severity. No EPSS data is available, and the vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been widely exploited. However, the remote nature of the exploit and the ability to command outbound connections present a tangible risk. Attackers would need network access to the system and could leverage the endpoint to reach internal or external resources, making the threat credible in environments with exposed interfaces.

Generated by OpenCVE AI on April 5, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Restrict external access to the judge_server_heartbeat service_url endpoint using firewalls or network ACLs
  • Apply any vendor patch or upgrade to a version newer than 1.6.1 when it becomes available
  • Monitor outbound traffic for unexpected or suspicious requests that may indicate SSRF exploitation
  • Review and tighten access controls for the OnlineJudge service

Generated by OpenCVE AI on April 5, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Qingdaou
Qingdaou onlinejudge
Vendors & Products Qingdaou
Qingdaou onlinejudge

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in QingdaoU OnlineJudge up to 1.6.1. Affected by this issue is the function service_url of the file JudgeServer.service_url of the component judge_server_heartbeat Endpoint. The manipulation results in server-side request forgery. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Title QingdaoU OnlineJudge judge_server_heartbeat Endpoint JudgeServer.service_url server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Qingdaou Onlinejudge
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T16:34:01.311Z

Reserved: 2026-04-04T06:44:15.570Z

Link: CVE-2026-5538

cve-icon Vulnrichment

Updated: 2026-04-06T16:33:57.501Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T04:16:15.950

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5538

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:16Z

Weaknesses