Skip to main content

API Endpoints

Base URL: https://wtfisthiscve.com

Get CVE Explanation

GET /api/cve/{cve_id}

Returns a plain English explanation for a CVE.

Parameters

ParameterTypeDescription
cve_idstringCVE identifier (e.g., CVE-2021-44228)

Headers

HeaderRequiredDescription
X-API-KeyYesYour API key

Example Request

curl -H "X-API-Key: your-api-key" \
https://wtfisthiscve.com/api/cve/CVE-2021-44228

Example Response

{
"ok": true,
"data": {
"cve_id": "CVE-2021-44228",
"title": "Log4Shell - Apache Log4j Remote Code Execution",
"severity": "CRITICAL",
"cvss_score": 10.0,
"summary": "A critical remote code execution vulnerability in Apache Log4j 2.x that allows attackers to execute arbitrary code by sending specially crafted log messages.",
"affected": "Apache Log4j versions 2.0-beta9 through 2.14.1. If you use Java applications that use Log4j for logging (very common), you may be affected. Check your dependencies.",
"fix": "Upgrade to Log4j 2.17.0 or later. As a temporary mitigation, you can set the system property log4j2.formatMsgNoLookups=true or remove the JndiLookup class from the classpath.",
"references": [
{
"title": "Apache Log4j Security Vulnerabilities",
"url": "https://logging.apache.org/log4j/2.x/security.html"
},
{
"title": "NVD - CVE-2021-44228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44228"
}
]
}
}

Response Fields

FieldTypeDescription
cve_idstringThe CVE identifier
titlestringShort descriptive title
severitystringCRITICAL, HIGH, MEDIUM, LOW, or UNKNOWN
cvss_scorenumberCVSS v3.1 base score (0-10), null if unknown
summarystringPlain English explanation of the vulnerability
affectedstringWho is affected and how to check
fixstringRemediation steps
referencesarrayLinks to official sources

Health Check

GET /health

Returns service health status. Does not require authentication.

Example Response

{
"ok": true,
"data": {
"status": "healthy",
"product": "wtfisthiscve"
}
}