Command Injection Vulnerability in Roxy-WI Web Interface for Server Management
CVE-2026-22265

7.5HIGH

Key Information:

Vendor

Roxy-wi

Status
Vendor
CVE Published:
15 January 2026

What is CVE-2026-22265?

Roxy-WI, a web interface designed for managing Haproxy, Nginx, Apache, and Keepalived servers, contains a command injection vulnerability in its log viewing functionality. This flaw allows authenticated users to execute arbitrary system commands due to the improper handling of parameters in the logs.py file. The oversight occurs where the grep parameter is utilized both in a sanitized and an unsanitized manner. This vulnerability has been addressed in version 8.2.8.2, and users are advised to upgrade to this version or later to safeguard their server management systems.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

roxy-wi < 8.2.8.2

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.