No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary File Read via Test Connection in wgcloud Backend Services |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tianshiyeben
Tianshiyeben wgcloud |
|
| Vendors & Products |
Tianshiyeben
Tianshiyeben wgcloud |
Thu, 19 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is an arbitrary file read vulnerability in the test connection function of backend database management in wgcloud v3.6.3 and before, which can be used to read any file on the victim's server. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-24T01:14:09.838Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-30403
Updated: 2026-03-24T01:12:29.111Z
Status : Awaiting Analysis
Published: 2026-03-19T17:16:23.950
Modified: 2026-03-24T02:16:04.563
Link: CVE-2026-30403
No data.
OpenCVE Enrichment
Updated: 2026-03-25T11:51:45Z