CVE-2026-33406

Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, configuration values from the /api/config endpoint are placed directly into HTML value="" attributes without escaping in settings-advanced.js, enabling HTML attribute injection. A double quote in any config value breaks out of the attribute context. JavaScript execution is blocked by the server's CSP (script-src 'self'), but injected attributes can alter element styling for UI redressing. The primary attack vector is importing a malicious teleporter backup, which bypasses per-field server-side validation. This vulnerability is fixed in 6.5.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*

History

14 Apr 2026, 02:04

Type Values Removed Values Added
First Time Pi-hole
Pi-hole web Interface
References () https://github.com/pi-hole/web/security/advisories/GHSA-9rfm-c5g6-538p - () https://github.com/pi-hole/web/security/advisories/GHSA-9rfm-c5g6-538p - Exploit, Vendor Advisory
CPE cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*

06 Apr 2026, 15:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-06 15:17

Updated : 2026-04-14 02:04


NVD link : CVE-2026-33406

Mitre link : CVE-2026-33406

CVE.ORG link : CVE-2026-33406


JSON object : View

Products Affected

pi-hole

  • web_interface
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')