Remote Code Execution Vulnerability in Roxy-WI by Roxy-WI
CVE-2026-33208

7.4HIGH

Key Information:

Vendor

Roxy-wi

Status
Vendor
CVE Published:
24 April 2026

What is CVE-2026-33208?

Roxy-WI, a web interface utilized for the management of Haproxy, Nginx, Apache, and Keepalived servers, has a vulnerability where the /config//find-in-config endpoint fails to adequately sanitize the 'words' parameter inputted by users. This can lead to the injection of arbitrary shell metacharacters, allowing an authenticated attacker to escape the intended grep command context and execute OS commands with sudo privileges on the target server. The issue has been addressed in version 8.2.6.4.

Affected Version(s)

roxy-wi < 8.2.6.4

References

CVSS V4

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.