API Endpoints
Base URL: https://wtfisthiscve.com
Get CVE Explanation
GET /api/cve/{cve_id}
Returns a plain English explanation for a CVE.
Parameters
| Parameter | Type | Description |
|---|---|---|
| cve_id | string | CVE identifier (e.g., CVE-2021-44228) |
Headers
| Header | Required | Description |
|---|---|---|
| X-API-Key | Yes | Your API key |
Example Request
curl -H "X-API-Key: your-api-key" \
https://wtfisthiscve.com/api/cve/CVE-2021-44228
Example Response
{
"ok": true,
"data": {
"cve_id": "CVE-2021-44228",
"title": "Log4Shell - Apache Log4j Remote Code Execution",
"severity": "CRITICAL",
"cvss_score": 10.0,
"summary": "A critical remote code execution vulnerability in Apache Log4j 2.x that allows attackers to execute arbitrary code by sending specially crafted log messages.",
"affected": "Apache Log4j versions 2.0-beta9 through 2.14.1. If you use Java applications that use Log4j for logging (very common), you may be affected. Check your dependencies.",
"fix": "Upgrade to Log4j 2.17.0 or later. As a temporary mitigation, you can set the system property log4j2.formatMsgNoLookups=true or remove the JndiLookup class from the classpath.",
"references": [
{
"title": "Apache Log4j Security Vulnerabilities",
"url": "https://logging.apache.org/log4j/2.x/security.html"
},
{
"title": "NVD - CVE-2021-44228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44228"
}
]
}
}
Response Fields
| Field | Type | Description |
|---|---|---|
| cve_id | string | The CVE identifier |
| title | string | Short descriptive title |
| severity | string | CRITICAL, HIGH, MEDIUM, LOW, or UNKNOWN |
| cvss_score | number | CVSS v3.1 base score (0-10), null if unknown |
| summary | string | Plain English explanation of the vulnerability |
| affected | string | Who is affected and how to check |
| fix | string | Remediation steps |
| references | array | Links to official sources |
Health Check
GET /health
Returns service health status. Does not require authentication.
Example Response
{
"ok": true,
"data": {
"status": "healthy",
"product": "wtfisthiscve"
}
}