Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers
Description
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers
AI Analyst Comment
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A high-severity vulnerability has been discovered in the web-based management interface for Keepalived servers. A remote attacker could potentially exploit this flaw to execute arbitrary commands on the underlying system, leading to a full server compromise. This vulnerability poses a significant risk to the availability and integrity of critical network services managed by Keepalived.
Vulnerability Details
CVE-ID: CVE-2026-22265
Affected Software: Keepalived Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: A command injection vulnerability exists within the web management interface (such as Roxy-WI) used to configure Keepalived services. An authenticated attacker with low-level privileges can inject malicious shell commands into input fields responsible for updating Keepalived configuration parameters. Due to insufficient input validation, these commands are executed on the server with the privileges of the web service account, which could allow an attacker to escalate privileges and gain complete control over the host system.
Business Impact
This vulnerability is rated as High severity with a CVSS score of 7.5. Successful exploitation could lead to remote code execution on servers that are fundamental to maintaining high-availability infrastructure. The potential consequences include significant service disruption, unauthorized access to sensitive network traffic and data, and the ability for an attacker to pivot deeper into the corporate network. The compromise of a Keepalived server could disable critical failover capabilities, leading to extended downtime and direct financial and reputational damage.
Remediation Plan
Immediate Action: Apply vendor security updates immediately across all affected systems. Prioritize patching for systems with internet-facing management interfaces. Before applying the patch, review access logs for any unusual or suspicious activity related to the management interface to identify potential prior compromise.
Proactive Monitoring: Monitor web server and application logs for suspicious requests to configuration endpoints, particularly those containing shell metacharacters (e.g.,
|,;,&&,$()). Monitor systems for unexpected processes spawned by the web server's user account and for any unusual outbound network connections that could indicate a successful compromise.Compensating Controls: If patching cannot be performed immediately, restrict network access to the management interface to a limited set of trusted administrative IP addresses using a firewall. If available, deploy a Web Application Firewall (WAF) with rules designed to detect and block command injection attack patterns.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of January 17, 2026, there are no publicly available proof-of-concept exploits or observed in-the-wild attacks targeting this vulnerability. However, vulnerabilities of this type are often quickly weaponized by threat actors due to their high impact. Organizations should assume that an exploit will become available in the near future.
Analyst Recommendation
This vulnerability presents a high risk to the availability and security of the organization's core network services. Given the severity score of 7.5, we recommend treating this as a critical priority for remediation. All teams responsible for managing Keepalived infrastructure should immediately apply the vendor-supplied patches. While this CVE is not yet on the CISA KEV list, its potential impact warrants an emergency change-management cycle to mitigate the risk of exploitation.