Description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to 8.2.8.2, command injection vulnerability exists in the log viewing functionality that allows authenticated users to execute arbitrary system commands. The vulnerability is in app/modules/roxywi/logs.py line 87, where the grep parameter is used twice - once sanitized and once raw. This vulnerability is fixed in 8.2.8.2.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-mmmf-vh7m-rm47
Patch x_refsource_misc
https://github.com/roxy-wi/roxy-wi/commit/f040d3338c4ba6f66127487361592e32e0188eee
Release Notes x_refsource_misc
https://github.com/roxy-wi/roxy-wi/releases/tag/v8.2.8.2
Scores
CVSS v3
7.5
EPSS
0.0018
EPSS Percentile
38.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (1)
roxy-wi/roxy-wi
< 8.2.8.2
Published
Jan 15, 2026
Tracked Since
Feb 18, 2026