Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, configuration values from the /api/config endpoint are placed directly into HTML value="" attributes without escaping in settings-advanced.js, enabling HTML attribute injection. A double quote in any config value breaks out of the attribute context. JavaScript execution is blocked by the server's CSP (script-src 'self'), but injected attributes can alter element styling for UI redressing. The primary attack vector is importing a malicious teleporter backup, which bypasses per-field server-side validation. This vulnerability is fixed in 6.5.
References
| Link | Resource |
|---|---|
| https://github.com/pi-hole/web/security/advisories/GHSA-9rfm-c5g6-538p | Exploit Vendor Advisory |
Configurations
History
14 Apr 2026, 02:04
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Pi-hole
Pi-hole web Interface |
|
| References | () https://github.com/pi-hole/web/security/advisories/GHSA-9rfm-c5g6-538p - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:* |
06 Apr 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-06 15:17
Updated : 2026-04-14 02:04
NVD link : CVE-2026-33406
Mitre link : CVE-2026-33406
CVE.ORG link : CVE-2026-33406
JSON object : View
Products Affected
pi-hole
- web_interface
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
