CVE-2026-33076
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the issue.
View on NVDAnalysis
Roxy-WI versions prior to 8.2.6.4 are vulnerable to a critical remote code execution flaw via path traversal in the haproxy_section_save interface. An attacker can leverage this to write malicious scheduled tasks, potentially gaining full control over the servers managing your load balancers and web servers. Update to version 8.2.6.4 immediately.
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-22EPSS
Affects
roxy-wi:roxy-wiTechnical description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the issue.