Vulnerability Description
Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a specially crafted HTTP request to /app/options.py file. This affects Roxy-wi versions before 6.1.1.0. Users are advised to upgrade. There are no known workarounds for this issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Roxy-Wi | Roxy-Wi | < 6.1.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-mh86-878h-43c9Third Party Advisory
- https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-mh86-878h-43c9Third Party Advisory
FAQ
What is CVE-2022-31126?
CVE-2022-31126 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Roxy-wi is an open source web interface for managing Haproxy, Nginx, Apache and Keepalived servers. A vulnerability in Roxy-wi allows a remote, unauthenticated attacker to code execution by sending a ...
How severe is CVE-2022-31126?
CVE-2022-31126 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-31126?
Check the references section above for vendor advisories and patch information. Affected products include: Roxy-Wi Roxy-Wi.