In the current Wazuh Vulnerability Detector module (enabled by default on the manager), we do integrate CVSS scores and severity ratings (e.g., Low, Medium, High, Critical) from sources like the Microsoft Security Updates (MSU), National Vulnerability Database (NVD), Open Source Vulnerabilities (OSV), Cybersecurity and Infrastructure Security Agency (CISA). These are pulled during scans that correlate your endpoint's software inventory (via Syscollector) with known CVEs, generating alerts with details like the CVSS v3 score (0-10 scale) and mapped severity.
Regarding your first query about CVSS scoring — yes, we do provide vulnerability severity ratings as High, Medium, and Low.
If you navigate to Threat Intelligence → Vulnerability Detection → Dashboard, you will see counts of vulnerabilities categorized as Critical, High, Medium, Low, and Pending evaluation.
Additionally, you can go to Threat Intelligence → Vulnerability Detection → Inventory.
From there, add the relevant field to the table by selecting Available fields and searching for vulnerability.score.base.
This will display the base vulnerability score in the results.
By default, you can also view the severity level (High, Medium, Low, Critical) under the vulnerability.severity field.
Wazuh is a comprehensive security information and event management (SIEM) and extended detection and response (XDR) platform that emphasises host-based monitoring, log analysis, and compliance. Therefore, yes, for now, you need to integrate with ModSecurity, Suricata, etc.. to monitor web-based attacks. As you mentioned, yes, you can also integrate Wazuh with Suricata to detect network-related attacks. For example, you can check these third-party guides to enhance Wazuh detection regarding web based attacks.
Ref:
https://www.packtpub.com/en-SG/product/security-monitoring-with-wazuh-9781837632152/chapter/chapter-1-intrusion-detection-system-ids-using-wazuh-2/section/testing-web-based-attacks-using-dvwa-ch02lvl1sec07