CVE-2026-4201 Overview
A critical unrestricted file upload vulnerability has been identified in glowxq glowxq-oj, an online judge system. This vulnerability affects the Upload function within the file business/business-system/src/main/java/com/glowxq/system/admin/controller/SysFileController.java. The flaw allows remote attackers to upload arbitrary files without proper validation, potentially leading to remote code execution or other severe security impacts.
Critical Impact
Remote attackers can exploit this unrestricted file upload vulnerability to upload malicious files, potentially achieving arbitrary code execution on the server. The exploit has been publicly disclosed, increasing the risk of active exploitation.
Affected Products
- glowxq glowxq-oj (up to commit 6f7c723090472057252040fd2bbbdaa1b5ed2393)
- SysFileController.java Upload function
- Note: This product does not use versioning; specific version information is unavailable
Discovery Timeline
- 2026-03-16 - CVE-2026-4201 published to NVD
- 2026-03-16 - Last updated in NVD database
Technical Details for CVE-2026-4201
Vulnerability Analysis
This vulnerability is classified under CWE-284 (Improper Access Control), specifically manifesting as an unrestricted file upload issue. The Upload function in SysFileController.java fails to implement proper validation controls on uploaded files.
The vulnerability exists because the application does not adequately restrict file types, validate file content, or enforce security controls during the file upload process. This allows attackers to bypass intended security restrictions and upload potentially malicious files to the server.
The network-accessible nature of this vulnerability means that attackers can exploit it remotely without requiring authentication or user interaction, significantly expanding the attack surface. The public availability of exploit information increases the likelihood of exploitation attempts.
Root Cause
The root cause of this vulnerability lies in improper access control implementation within the file upload functionality. The SysFileController.java controller fails to implement essential security checks including:
- File type validation (MIME type and extension checks)
- File content inspection
- Upload directory restrictions
- Access control enforcement on the upload endpoint
This oversight allows attackers to manipulate the upload process and submit arbitrary file types that should otherwise be restricted.
Attack Vector
The attack can be executed remotely over the network. An attacker can craft malicious HTTP requests targeting the file upload endpoint exposed by SysFileController.java. By manipulating the request parameters, attackers can upload files with dangerous extensions (such as .jsp, .php, or .exe) or embed malicious payloads within seemingly legitimate files.
The exploitation process typically involves:
- Identifying the vulnerable upload endpoint
- Crafting a multipart HTTP request with a malicious file payload
- Bypassing any client-side validation through direct request manipulation
- Uploading a web shell or other malicious content
- Executing the uploaded payload to gain further system access
For technical details on the vulnerability mechanism, refer to the VulDB entry #351113 and the associated disclosure documentation.
Detection Methods for CVE-2026-4201
Indicators of Compromise
- Unusual file uploads to the application's upload directories, particularly files with executable extensions (.jsp, .php, .sh, .exe)
- Presence of web shells or suspicious scripts in web-accessible directories
- Unexpected outbound network connections from the web server
- Anomalous HTTP POST requests to the file upload endpoint with large payloads or unusual file types
Detection Strategies
- Monitor HTTP traffic for multipart/form-data POST requests to /admin/controller/SysFileController or similar upload endpoints
- Implement file integrity monitoring on web server directories to detect unauthorized file additions
- Deploy web application firewall (WAF) rules to block uploads of potentially dangerous file types
- Analyze server logs for patterns indicative of web shell activity or reconnaissance
Monitoring Recommendations
- Enable detailed logging for all file upload operations including source IP, filename, file size, and MIME type
- Configure alerts for file uploads containing executable content or script extensions
- Implement real-time monitoring of web-accessible directories for new file creation events
- Review and correlate authentication logs with upload activity to identify unauthorized access attempts
How to Mitigate CVE-2026-4201
Immediate Actions Required
- Disable or restrict access to the file upload functionality in SysFileController.java until a patch is available
- Implement network-level access controls to limit who can reach the upload endpoint
- Deploy a web application firewall (WAF) with rules to block malicious file uploads
- Review existing uploaded files for signs of malicious content and quarantine suspicious files
- Monitor the application for signs of exploitation while implementing temporary controls
Patch Information
No official patch is currently available from the vendor. The vendor was contacted regarding this disclosure but did not respond. Organizations using glowxq-oj should consider:
- Implementing the workarounds listed below
- Monitoring for updates from the vendor or community
- Evaluating alternative solutions if security patches are not forthcoming
- Tracking the VulDB entry for updates on remediation options
Workarounds
- Implement server-side file type validation using allowlists for permitted file extensions and MIME types
- Store uploaded files outside the web root to prevent direct execution
- Rename uploaded files with random identifiers to obscure their original names and prevent predictable access
- Apply strict file permissions on upload directories to prevent execution
- Consider disabling the upload functionality entirely if not critical to business operations
# Example: Restrict upload directory permissions
chmod 644 /path/to/upload/directory/*
chown www-data:www-data /path/to/upload/directory
# Disable execution in upload directories (Apache)
# Add to .htaccess in upload directory:
# php_flag engine off
# Options -ExecCGI
# AddHandler cgi-script .php .pl .py .jsp .asp .sh .cgi
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

