Unrated severityNVD Advisory· Published Mar 17, 2026· Updated Mar 18, 2026
Roxy-WI has a Command Injection via diff parameter in config comparison allows authenticated RCE
CVE-2026-27811
Description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the /config/compare/<service>/<server_ip>/show endpoint, allowed authenticated users to execute arbitrary system commands on the app host. The vulnerability exists in app/modules/config/config.py on line 362, where user input is directly formatted in the template string that is eventually executed. Version 8.2.6.3 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/roxy-wi/roxy-wi/commit/a10ac7306c252014f97a7213db4a9470300fa064mitrex_refsource_MISC
- github.com/roxy-wi/roxy-wi/releases/tag/v8.2.6.3mitrex_refsource_MISC
- github.com/roxy-wi/roxy-wi/security/advisories/GHSA-jvmv-cw47-jh77mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.