CVE-2026-33078
Published: 24 April 2026
Summary
CVE-2026-33078 is a critical-severity SQL Injection (CWE-89) vulnerability in Roxy-Wi Roxy-Wi. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation of untrusted URL parameters like server_ip before interpolation into SQL queries.
Ensures timely remediation of the specific SQL injection flaw through patching to Roxy-WI version 8.2.6.4.
Boundary protection with web application firewalls can inspect and block SQL injection payloads targeting the server_ip parameter.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in publicly facing Roxy-WI web app (unsanitized URL param into SQL query) directly enables remote unauthenticated exploitation of the application, matching T1190.
NVD Description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 8.2.6.4 have a SQL injection vulnerability in the haproxy_section_save function in app/routes/config/routes.py. The server_ip parameter, sourced from the URL path, is passed unsanitized through…
more
multiple function calls and ultimately interpolated into a SQL query string using Python string formatting, allowing attackers to execute arbitrary SQL commands. Version 8.2.6.4 fixes the issue.
Deeper analysisAI
CVE-2026-33078 is a SQL injection vulnerability affecting Roxy-WI, a web interface for managing HAProxy, Nginx, Apache, and Keepalived servers. Versions prior to 8.2.6.4 are vulnerable due to improper handling of the server_ip parameter in the haproxy_section_save function located in app/routes/config/routes.py. This parameter, sourced directly from the URL path, is passed unsanitized through multiple function calls and interpolated into a SQL query string via Python string formatting, enabling arbitrary SQL command execution. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-89.
The vulnerability can be exploited remotely over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to execute arbitrary SQL commands against the backend database, potentially leading to high-impact confidentiality, integrity, and availability violations, such as data exfiltration, modification, or deletion.
Mitigation is addressed in Roxy-WI version 8.2.6.4, which fixes the issue through a patch detailed in the project's GitHub commit aecc7971959092fa93e93531f1ffcde33524b031. Security practitioners should upgrade to this version immediately, as outlined in the GitHub Security Advisory GHSA-jmj9-2c4q-849j.
Details
- CWE(s)