CVE-2026-26952

5.4 MEDIUM

📋 TL;DR

CVE-2026-26952 is a stored HTML injection vulnerability in Pi-hole Admin Interface versions 6.4 and below. Authenticated administrators can inject malicious HTML attributes through the local DNS records configuration page, which persists in the configuration and renders each time the DNS records table is viewed. The impact is limited by Pi-hole's Content Security Policy that blocks inline JavaScript execution.

💻 Affected Systems

Products:
  • Pi-hole Admin Interface
Versions: Versions 6.4 and below
Operating Systems: All platforms running Pi-hole
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the web interface enabled and requires authenticated administrator access.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious administrator could inject HTML attributes that modify the interface appearance or behavior, potentially creating phishing elements or disrupting the admin interface functionality.

🟠

Likely Case

Limited HTML attribute injection that could alter table appearance or create misleading interface elements, but no code execution due to CSP restrictions.

🟢

If Mitigated

Only visual interface modifications with no security impact beyond potential confusion or minor interface disruption.

🌐 Internet-Facing: LOW - Requires authenticated administrator access and cannot execute JavaScript due to CSP.
🏢 Internal Only: MEDIUM - Authenticated administrators have access, but impact is limited to interface manipulation without code execution.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access to the Pi-hole web interface and knowledge of HTML attribute injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.1

Vendor Advisory: https://github.com/pi-hole/web/security/advisories/GHSA-6xp4-jw73-f4qp

Restart Required: No

Instructions:

1. Update Pi-hole web interface to version 6.4.1 or later. 2. Run 'pihole -up' to update Pi-hole components. 3. Clear browser cache to ensure new interface loads.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to trusted users only and implement strong authentication controls.

Disable Web Interface

linux

Temporarily disable the web interface if not required, using Pi-hole CLI for management.

sudo pihole disable

🧯 If You Can't Patch

  • Implement strict access controls to limit who has administrative access to the Pi-hole interface.
  • Monitor DNS configuration changes and audit administrative actions regularly.

🔍 How to Verify

Check if Vulnerable:

Check Pi-hole web interface version in Settings > System or run 'pihole -v' and check web interface version.

Check Version:

pihole -v | grep 'Web Interface'

Verify Fix Applied:

Verify web interface version is 6.4.1 or later and test DNS record input with special characters to ensure proper escaping.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DNS record entries containing HTML special characters or quotes
  • Multiple configuration changes from same admin session

Network Indicators:

  • Unusual HTTP requests to DNS configuration endpoints with payloads containing quotes or HTML attributes

SIEM Query:

source="pihole" AND (message="*DNS*record*" AND (message="*\"*" OR message="*<*" OR message="*>*"))

🔗 References

📤 Share & Export