Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 8.2.6.4 have a SQL injection vulnerability in the haproxy_section_save function in app/routes/config/routes.py. The server_ip parameter, sourced from the URL path, is passed unsanitized through multiple function calls and ultimately interpolated into a SQL query string using Python string formatting, allowing attackers to execute arbitrary SQL commands. Version 8.2.6.4 fixes the issue.
Use CWE-89, Roxy-Wi vendor hub and Roxy-Wi product page to widen CVE-2026-33078 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-33076, CVE-2026-27811 and CVE-2024-43804 for nearby disclosures in the same product family.