Path Traversal Vulnerability in Roxy-WI Web Interface for Server Management
CVE-2026-33431
5.7MEDIUM
What is CVE-2026-33431?
Roxy-WI, a web interface designed for managing Haproxy, Nginx, Apache, and Keepalived servers, is susceptible to a path traversal vulnerability. This flaw exists in the API endpoint POST /config//show prior to version 8.2.6.4, wherein the configver parameter is improperly validated. An authenticated attacker can manipulate this parameter using '../' sequences to traverse directories, thereby gaining access to sensitive files within the system. The vulnerability circumvents the existing safety measures that only check the static base directory path. Roxy-WI has addressed this issue in version 8.2.6.4, providing a critical security patch.
Affected Version(s)
roxy-wi < 8.2.6.4
