CVE-2026-27811
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
18/03/2026
Last modified:
19/03/2026
Description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare///show` endpoint, allowed authenticated users to execute arbitrary system commands on the app host. The vulnerability exists in `app/modules/config/config.py` on line 362, where user input is directly formatted in the template string that is eventually executed. Version 8.2.6.3 fixes the issue.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:* | 8.2.6.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



