Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to version 8.2.6.4, the haproxy_section_save interface presents a vulnerability that could lead to remote code execution due to path traversal and writing into scheduled tasks. Version 8.2.6.4 fixes the issue.
CVSS
No CVSS.
References
Configurations
No configuration.
History
24 Apr 2026, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-mmgm-p9x9-h33j - |
24 Apr 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-24 03:16
Updated : 2026-04-24 19:17
NVD link : CVE-2026-33076
Mitre link : CVE-2026-33076
CVE.ORG link : CVE-2026-33076
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
