CVE-2026-22265
- EPSS 0.15%
- Veröffentlicht 15.01.2026 16:27:52
- Zuletzt bearbeitet 18.02.2026 17:38:54
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Prior to 8.2.8.2, command injection vulnerability exists in the log viewing functionality that allows authenticated users to execute arbitrary system commands. The...
- EPSS 5.15%
- Veröffentlicht 03.01.2025 22:15:06
- Zuletzt bearbeitet 26.08.2025 21:15:32
A vulnerability was found in Roxy-WI up to 8.1.3. It has been declared as critical. Affected by this vulnerability is the function action_service of the file app/modules/roxywi/roxy.py. The manipulation of the argument action/service leads to os comm...
CVE-2024-43804
- EPSS 2.2%
- Veröffentlicht 29.08.2024 17:15:08
- Zuletzt bearbeitet 06.09.2024 22:57:01
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. An OS Command Injection vulnerability allows any authenticated user on the application to execute arbitrary code on the web application server via port scanning fu...
CVE-2023-29004
- EPSS 0.34%
- Veröffentlicht 17.04.2023 19:15:07
- Zuletzt bearbeitet 21.11.2024 07:56:22
hap-wi/roxy-wi is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A Path Traversal vulnerability was found in the current version of Roxy-WI (6.3.9.0 at the moment of writing this report). The vulnerability can be exploite...
CVE-2023-25804
- EPSS 0.38%
- Veröffentlicht 15.03.2023 18:15:10
- Zuletzt bearbeitet 21.11.2024 07:50:14
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a ...
CVE-2023-25803
- EPSS 1.15%
- Veröffentlicht 13.03.2023 20:15:15
- Zuletzt bearbeitet 21.11.2024 07:50:13
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a directory traversal vulnerability that allows the inclusion of server-side files. This issue is fixed in version 6.3.5.0.
CVE-2023-25802
- EPSS 0.62%
- Veröffentlicht 13.03.2023 20:15:14
- Zuletzt bearbeitet 21.11.2024 07:50:13
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a se...
CVE-2022-31161
- EPSS 85.7%
- Veröffentlicht 15.07.2022 21:15:08
- Zuletzt bearbeitet 21.11.2024 07:04:01
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/optio...
- EPSS 93.97%
- Veröffentlicht 08.07.2022 20:15:07
- Zuletzt bearbeitet 21.11.2024 07:03:58
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without pro...
CVE-2022-31125
- EPSS 12.86%
- Veröffentlicht 06.07.2022 18:15:19
- Zuletzt bearbeitet 21.11.2024 07:03:56
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to bypass authentication and access admin functionality by sending a specially cr...