There is an arbitrary file read vulnerability in the test connection function of backend database management in wgcloud v3.6.3 and before, which can be used to read any file on the victim's server.
References
| Link | Resource |
|---|---|
| https://github.com/TTTlw1024/qwe/issues/2 | Exploit Issue Tracking |
| https://github.com/tianshiyeben/wgcloud/issues/97 | Issue Tracking |
Configurations
History
02 Apr 2026, 12:19
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/TTTlw1024/qwe/issues/2 - Exploit, Issue Tracking | |
| References | () https://github.com/tianshiyeben/wgcloud/issues/97 - Issue Tracking | |
| First Time |
Wgstart wgcloud
Wgstart |
|
| CPE | cpe:2.3:a:wgstart:wgcloud:*:*:*:*:*:*:*:* |
24 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-22 | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
19 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 17:16
Updated : 2026-04-02 12:19
NVD link : CVE-2026-30403
Mitre link : CVE-2026-30403
CVE.ORG link : CVE-2026-30403
JSON object : View
Products Affected
wgstart
- wgcloud
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
