Cyber Posture

CVE-2026-33078

CriticalPublic PoC

Published: 24 April 2026

Published
24 April 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 11.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33078 is a critical-severity SQL Injection (CWE-89) vulnerability in Roxy-Wi Roxy-Wi. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation of untrusted URL parameters like server_ip before interpolation into SQL queries.

prevent

Ensures timely remediation of the specific SQL injection flaw through patching to Roxy-WI version 8.2.6.4.

prevent

Boundary protection with web application firewalls can inspect and block SQL injection payloads targeting the server_ip parameter.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in publicly facing Roxy-WI web app (unsanitized URL param into SQL query) directly enables remote unauthenticated exploitation of the application, matching T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 8.2.6.4 have a SQL injection vulnerability in the haproxy_section_save function in app/routes/config/routes.py. The server_ip parameter, sourced from the URL path, is passed unsanitized through…

more

multiple function calls and ultimately interpolated into a SQL query string using Python string formatting, allowing attackers to execute arbitrary SQL commands. Version 8.2.6.4 fixes the issue.

Deeper analysisAI

CVE-2026-33078 is a SQL injection vulnerability affecting Roxy-WI, a web interface for managing HAProxy, Nginx, Apache, and Keepalived servers. Versions prior to 8.2.6.4 are vulnerable due to improper handling of the server_ip parameter in the haproxy_section_save function located in app/routes/config/routes.py. This parameter, sourced directly from the URL path, is passed unsanitized through multiple function calls and interpolated into a SQL query string via Python string formatting, enabling arbitrary SQL command execution. The vulnerability is rated with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-89.

The vulnerability can be exploited remotely over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to execute arbitrary SQL commands against the backend database, potentially leading to high-impact confidentiality, integrity, and availability violations, such as data exfiltration, modification, or deletion.

Mitigation is addressed in Roxy-WI version 8.2.6.4, which fixes the issue through a patch detailed in the project's GitHub commit aecc7971959092fa93e93531f1ffcde33524b031. Security practitioners should upgrade to this version immediately, as outlined in the GitHub Security Advisory GHSA-jmj9-2c4q-849j.

Details

CWE(s)

Affected Products

roxy-wi
roxy-wi
≤ 8.2.6.4

CVEs Like This One

CVE-2026-33076Same product: Roxy-Wi Roxy-Wi
CVE-2026-33432Same product: Roxy-Wi Roxy-Wi
CVE-2026-22265Same product: Roxy-Wi Roxy-Wi
CVE-2026-27811Same product: Roxy-Wi Roxy-Wi
CVE-2026-33208Same product: Roxy-Wi Roxy-Wi
CVE-2026-33077Same product: Roxy-Wi Roxy-Wi
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89

References