CVE-2026-27811 PUBLISHED

Roxy-WI has a Command Injection via diff parameter in config comparison allows authenticated RCE

Assigner: GitHub_M
Reserved: 24.02.2026 Published: 17.03.2026 Updated: 17.03.2026

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the /config/compare/<service>/<server_ip>/show endpoint, allowed authenticated users to execute arbitrary system commands on the app host. The vulnerability exists in app/modules/config/config.py on line 362, where user input is directly formatted in the template string that is eventually executed. Version 8.2.6.3 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor roxy-wi
Product roxy-wi
Versions
  • Version < 8.2.6.3 is affected

References

Problem Types

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE