The backend database management connection test feature in wgcloud v3.6.3 has a server-side request forgery (SSRF) vulnerability. This issue can be exploited to make the server send requests to probe the internal network, remotely download malicious files, and perform other dangerous operations.
References
| Link | Resource |
|---|---|
| https://github.com/TTTlw1024/qwe/issues/3 | Exploit Issue Tracking |
| https://github.com/tianshiyeben/wgcloud/issues/98 | Issue Tracking |
Configurations
History
02 Apr 2026, 12:20
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Wgstart wgcloud
Wgstart |
|
| CPE | cpe:2.3:a:wgstart:wgcloud:*:*:*:*:*:*:*:* | |
| References | () https://github.com/TTTlw1024/qwe/issues/3 - Exploit, Issue Tracking | |
| References | () https://github.com/tianshiyeben/wgcloud/issues/98 - Issue Tracking |
24 Mar 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-918 | |
| Summary |
|
19 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-19 16:16
Updated : 2026-04-02 12:20
NVD link : CVE-2026-30404
Mitre link : CVE-2026-30404
CVE.ORG link : CVE-2026-30404
JSON object : View
Products Affected
wgstart
- wgcloud
CWE
CWE-918
Server-Side Request Forgery (SSRF)
