Skip to content
CVSS 8.8 · HIGH

CVE-2026-33208

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the /config/ < service > /find-in-config endpoint in Roxy-WI fails to sanitize the user-supplied words parameter before embedding it into a shell command string that is subsequently executed on a remote managed server via SSH. An authenticated attacker can inject arbitrary shell metacharacters to break out of the intended grep command context and execute arbitrary OS commands with sudo privileges on the target server, resulting in full Remote Code Execution (RCE). Version 8.2.6.4 patches the issue.

View on NVD

Analysis

Roxy-WI versions prior to 8.2.6.4 contain a command injection vulnerability that allows authenticated users to achieve full Remote Code Execution (RCE) with sudo privileges on managed servers. If you use Roxy-WI to manage HAProxy, Nginx, or Apache instances, upgrade to the latest version immediately to secure your infrastructure.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-78

EPSS

Probability of exploitation (next 30 days): 0.0032 (0.3%)
Percentile: 55.1%
EPSS: 2026-05-06

Affects

roxy-wi:roxy-wi

Technical description

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the /config/ < service > /find-in-config endpoint in Roxy-WI fails to sanitize the user-supplied words parameter before embedding it into a shell command string that is subsequently executed on a remote managed server via SSH. An authenticated attacker can inject arbitrary shell metacharacters to break out of the intended grep command context and execute arbitrary OS commands with sudo privileges on the target server, resulting in full Remote Code Execution (RCE). Version 8.2.6.4 patches the issue.

Published: 4/24/2026, 3:16:10 AM
Last modified: 4/27/2026, 3:16:15 PM

References

HomeEventsBlogResourcesTeam