Ad

CVE-2026-27811

HIGH CVSS 3.1: 8.8 EPSS 0.78%
Updated Mar 19, 2026
Apache
Parameter Value
CVSS 8.8 (HIGH)
Affected Versions before 8.2.6.3
Fixed In 8.2.6.3
Type CWE-78 (OS Command Injection), CWE-77 (Command Injection)
Vendor Apache
Public PoC No

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.3, a command injection vulnerability exists in the `/config/compare/<service>/<server_ip>/show` endpoint, allowed authenticated users to execute arbitrary system commands on the app host. The vulnerability exists in `app/modules/config/config.py` on line 362, where user input is directly formatted in the template string that is eventually executed.

Version 8.2.6.3 fixes the issue.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
Low
Basic privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
High
Complete data leak
Integrity
High
Complete data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Roxy-Wi Roxy-Wi
cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:*
8.2.6.3