CVE-2026-33076
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the issue.
Ver en NVDAnálisis
Roxy-WI versions prior to 8.2.6.4 are vulnerable to a critical remote code execution flaw via path traversal in the haproxy_section_save interface. An attacker can leverage this to write malicious scheduled tasks, potentially gaining full control over the servers managing your load balancers and web servers. Update to version 8.2.6.4 immediately.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCWE-22EPSS
Afecta
roxy-wi:roxy-wiDescripción técnica
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the issue.