CVE-2026-33208

Severity CVSS v4.0:
HIGH
Type:
CWE-78 OS Command Injections
Publication date:
24/04/2026
Last modified:
27/04/2026

Description

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the /config/ /find-in-config endpoint in Roxy-WI fails to sanitize the user-supplied words parameter before embedding it into a shell command string that is subsequently executed on a remote managed server via SSH. An authenticated attacker can inject arbitrary shell metacharacters to break out of the intended grep command context and execute arbitrary OS commands with sudo privileges on the target server, resulting in full Remote Code Execution (RCE). Version 8.2.6.4 patches the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:* 8.2.6.4 (excluding)