{"id":"CVE-2023-25802","summary":"Roxy-WI has Path Traversal vulnerability","details":"Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.6.0 don't correctly neutralize `dir/../filename` sequences, such as `/etc/nginx/../passwd`, allowing an actor to gain information about a server. Version 6.3.6.0 has a patch for this issue.","aliases":["GHSA-qcmp-q5h3-784m"],"modified":"2026-04-15T04:38:36.070671Z","published":"2023-03-13T19:35:11.243Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/25xxx/CVE-2023-25802.json","cwe_ids":["CWE-22","CWE-26"],"cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/25xxx/CVE-2023-25802.json"},{"type":"ADVISORY","url":"https://github.com/hap-wi/roxy-wi/security/advisories/GHSA-qcmp-q5h3-784m"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25802"},{"type":"FIX","url":"https://github.com/hap-wi/roxy-wi/commit/0054f25da7cf8c7480452f48e39308b5e392dc67"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/roxy-wi/roxy-wi","events":[{"introduced":"0"},{"fixed":"f82b036ef86d28a2236934199cba42d066d45ebc"},{"fixed":"0054f25da7cf8c7480452f48e39308b5e392dc67"}],"database_specific":{"cpe":"cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"6.3.6.0"}],"source":["CPE_FIELD","REFERENCES"]}}],"versions":["3.4.4.6","3.4.4.7","3.4.5","3.4.5.1","v.5.3.5.0","v1.0","v1.1","v1.10","v1.10.1","v1.10.2","v1.10.2.1","v1.3","v1.4","v1.4.1","v1.6","v1.9.1","v2.0.2","v3.2.13","v3.3","v4.4.1.0","v5.1.1.0","v5.1.4.0","v5.2.0","v5.2.1","v5.2.2.0","v5.2.3.0","v5.2.4.0","v5.2.5.0","v5.2.6.0","v5.3.0.0","v5.3.1.0","v5.3.2.0","v5.3.3.0","v5.3.4.0","v5.3.6.0","v5.4.0.0","v5.4.1.0","v5.4.2.0","v5.4.3.0","v5.5.0.0","v5.5.1.0","v6.0.0.0","v6.0.1.0","v6.0.2.0","v6.0.3.0","v6.1.0.0","v6.1.1.0","v6.1.2.0","v6.1.3.0","v6.1.4.0","v6.1.5.0","v6.2.0.0","v6.2.1.0","v6.2.2.0","v6.2.3.0","v6.3.0.0","v6.3.1.0","v6.3.2.0","v6.3.3.0","v6.3.4.0","v6.3.5.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-25802.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}