Description
The backend database management connection test feature in wgcloud v3.6.3 has a server-side request forgery (SSRF) vulnerability. This issue can be exploited to make the server send requests to probe the internal network, remotely download malicious files, and perform other dangerous operations.
Published: 2026-03-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑side request forgery allowing the attacker to probe internal networks and download arbitrary files
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the backend database management connection test feature of wgcloud 3.6.3 and enables a classic SSRF flaw (CWE‑918). When exercised, the server will send requests to arbitrary URLs specified by the attacker. This can be used to discover internal services, transfer sensitive data out of the protected network, or download malicious payloads for later exploitation. The impact is therefore the inadvertent disclosure or manipulation of internal data and the potential for further compromise, with confidentiality and integrity risks for the organization’s internal resources.

Affected Systems

The affected product is wgcloud version 3.6.3, distributed by the vendor wgstart. No other vendors or products are explicitly listed; the CPE string confirms a single product family. The flaw is limited to the database connection test functionality within this version.

Risk and Exploitability

The CVSS score of 7.5 denotes a high level of risk while the EPSS value of less than 1% suggests that current exploit attempts are rare. This vulnerability is not listed in the CISA KEV catalog, implying that widespread, publicly available exploits are not yet known. The likely attack vector requires exploitation of the API endpoint that initiates the connection test, possibly requiring authenticated access by an administrator or privileged user. Once accessed, the attacker can instruct the server to reach out to any internal or external address, exposing the network to reconnaissance and entry points for further attacks.

Generated by OpenCVE AI on April 2, 2026 at 13:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest release of wgcloud that removes the vulnerable connection‑test endpoint.
  • If an upgrade is not immediately possible, disable or block the database connection test feature in the application configuration or via API restrictions.
  • Configure network segmentation or firewall rules to restrict outbound connections from the wgcloud server to only known, trusted destinations.
  • Monitor logs for unexpected outbound HTTP requests or connection attempts originating from the wgcloud service.

Generated by OpenCVE AI on April 2, 2026 at 13:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title wgcloud 3.6.3 SSRF Vulnerability

Thu, 02 Apr 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Wgstart
Wgstart wgcloud
CPEs cpe:2.3:a:wgstart:wgcloud:*:*:*:*:*:*:*:*
Vendors & Products Wgstart
Wgstart wgcloud

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Title wgcloud 3.6.3 SSRF Vulnerability

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tianshiyeben
Tianshiyeben wgcloud
Vendors & Products Tianshiyeben
Tianshiyeben wgcloud

Thu, 19 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description The backend database management connection test feature in wgcloud v3.6.3 has a server-side request forgery (SSRF) vulnerability. This issue can be exploited to make the server send requests to probe the internal network, remotely download malicious files, and perform other dangerous operations.
References

Subscriptions

Tianshiyeben Wgcloud
Wgstart Wgcloud
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-24T01:10:21.428Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30404

cve-icon Vulnrichment

Updated: 2026-03-24T01:10:17.126Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T16:16:02.060

Modified: 2026-04-02T12:20:21.730

Link: CVE-2026-30404

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:23:23Z

Weaknesses