External Control of File Name or Path in Roxy-WI - CVE-2026-45556
Published: May 16, 2026
Roxy-WI
Detailed vulnerability description
The vulnerability allows a remote user to execute arbitrary code.
The vulnerability exists due to external control of file name or path in the POST /waf///rule//save endpoint when handling a crafted config_file_name value during WAF rule save operations. A remote user can send a specially crafted request to execute arbitrary code.
The issue can write attacker-controlled file contents to arbitrary paths on every managed load balancer in the caller's group, and the written file may be executed as root by downstream system components such as cron.