top of page
perceptive_background_267k.jpg

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the…

Published:

17 maart 2026 om 23:00:00

Alert date:

18 maart 2026 om 15:08:05

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Network Infrastructure

Roxy-WI, a web interface for managing Haproxy, Nginx, Apache and Keepalived servers, contains a command injection vulnerability in versions prior to 8.2.6.3. The vulnerability exists in the /config/compare/<service>/<server_ip>/show endpoint where authenticated users can execute arbitrary system commands on the application host. The issue is located in app/modules/config/config.py at line 362, where user input is directly formatted in a template string that gets executed. The vulnerability has been fixed in version 8.2.6.3.

Technical details

Mitigation steps:

Affected products:

Roxy-WI

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page