{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T15:27:26.898","vulnerabilities":[{"cve":{"id":"CVE-2026-30403","sourceIdentifier":"cve@mitre.org","published":"2026-03-19T17:16:23.950","lastModified":"2026-04-02T12:19:47.237","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"There is an arbitrary file read vulnerability in the test connection function of backend database management in wgcloud v3.6.3 and before, which can be used to read any file on the victim's server."},{"lang":"es","value":"Hay una vulnerabilidad de lectura arbitraria de archivos en la función de prueba de conexión de la gestión de bases de datos de backend en wgcloud v3.6.3 y versiones anteriores, que puede ser utilizada para leer cualquier archivo en el servidor de la víctima."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wgstart:wgcloud:*:*:*:*:*:*:*:*","versionEndIncluding":"3.6.3","matchCriteriaId":"CE012BD6-0C9B-4F63-957E-78C9565F977C"}]}]}],"references":[{"url":"https://github.com/TTTlw1024/qwe/issues/2","source":"cve@mitre.org","tags":["Exploit","Issue Tracking"]},{"url":"https://github.com/tianshiyeben/wgcloud/issues/97","source":"cve@mitre.org","tags":["Issue Tracking"]}]}}]}