CVE-2026-33765

Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions prior to 6.0 have a critical OS Command Injection vulnerability in the savesettings.php file. The application takes the user-controlled $_POST['webtheme'] parameter and concatenates it directly into a system command executed via PHP's exec() function. Since the input is neither sanitized nor validated before being passed to the shell, an attacker can append arbitrary system commands to the intended pihole command. Furthermore, because the command is executed with sudo privileges, the injected commands will run with elevated (likely root) privileges. Version 6.0 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*

History

07 Apr 2026, 18:15

Type Values Removed Values Added
References () https://github.com/pi-hole/web/security/advisories/GHSA-828h-5x96-rqx7 - () https://github.com/pi-hole/web/security/advisories/GHSA-828h-5x96-rqx7 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*
First Time Pi-hole
Pi-hole web Interface

27 Mar 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 20:16

Updated : 2026-04-07 18:15


NVD link : CVE-2026-33765

Mitre link : CVE-2026-33765

CVE.ORG link : CVE-2026-33765


JSON object : View

Products Affected

pi-hole

  • web_interface
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')