Impact
The vulnerability resides in the test connection function of the backend database management in wgcloud, allowing an attacker to read any file on the victim’s server when using wgcloud version 3.6.3 or earlier. This can expose configuration files, credentials, and other sensitive data, enabling broader compromise or data exfiltration.
Affected Systems
The affected product is wgcloud developed by wgstart. Versions 3.6.3 and all earlier releases of wgcloud are impacted.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity potential impact. EPSS indicates that exploitation is unlikely (<1%), and the vulnerability is not listed in CISA’s KEV catalog. Based on the nature of the function, the attack vector is inferred to be remote via the web interface or API that exposes the test connection endpoint.
OpenCVE Enrichment