Cyber Posture

CVE-2026-30402

CriticalPublic PoCRCE

Published: 19 March 2026

Published
19 March 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30402 is a critical-severity Code Injection (CWE-94) vulnerability in Wgstart Wgcloud. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 40.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CWE-94 code injection in the test connection function by enforcing input validation mechanisms to reject malicious inputs.

prevent

Prevents unauthenticated remote attackers from accessing the vulnerable test connection function by limiting permitted actions without identification or authentication.

prevent

Addresses the specific flaw in wgcloud by identifying, reporting, and remediating the vulnerability through timely patching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2026-30402 is an unauthenticated remote code execution vulnerability in a network-accessible application (wgcloud), directly enabling exploitation of public-facing applications for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An issue in wgcloud v.2.3.7 and before allows a remote attacker to execute arbitrary code via the test connection function

Deeper analysisAI

CVE-2026-30402 is a critical vulnerability (CVSS 9.8, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) affecting wgcloud versions 2.3.7 and prior. The issue, classified under CWE-94 (code injection), enables a remote attacker to execute arbitrary code through the test connection function.

Any unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to achieve high-impact effects on confidentiality, integrity, and availability, including full arbitrary code execution on the targeted system.

Mitigation details and further information are available in the referenced GitHub issues: https://github.com/TTTlw1024/qwe/issues/1 and https://github.com/tianshiyeben/wgcloud/issues/96. The vulnerability was published on 2026-03-19T15:16:26.190.

Details

CWE(s)

Affected Products

wgstart
wgcloud
≤ 2.3.7

CVEs Like This One

CVE-2026-30403Same product: Wgstart Wgcloud
CVE-2026-30404Same product: Wgstart Wgcloud
CVE-2026-35178Shared CWE-94
CVE-2024-1490Shared CWE-94
CVE-2024-7419Shared CWE-94
CVE-2025-46581Shared CWE-94
CVE-2025-65037Shared CWE-94
CVE-2025-10679Shared CWE-94
CVE-2024-57401Shared CWE-94
CVE-2026-23498Shared CWE-94

References