CVE-2026-35491

FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, Pi-hole FTL supports a CLI password feature (webserver.api.cli_pw) that creates “CLI” API sessions intended to be read-only for configuration changes. While /api/config correctly blocks CLI sessions from mutating configuration, /api/teleporter allowed Teleporter imports for CLI sessions, enabling a CLI-scoped session to overwrite configuration via a Teleporter archive (authorization bypass). This vulnerability is fixed in 6.6.
References
Link Resource
https://github.com/pi-hole/FTL/security/advisories/GHSA-r7g8-3fj7-m5qq Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:pi-hole:ftldns:*:*:*:*:*:*:*:*

History

17 Apr 2026, 19:47

Type Values Removed Values Added
References () https://github.com/pi-hole/FTL/security/advisories/GHSA-r7g8-3fj7-m5qq - () https://github.com/pi-hole/FTL/security/advisories/GHSA-r7g8-3fj7-m5qq - Exploit, Mitigation, Vendor Advisory
CPE cpe:2.3:a:pi-hole:ftldns:*:*:*:*:*:*:*:*
First Time Pi-hole
Pi-hole ftldns

07 Apr 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-07 16:16

Updated : 2026-04-17 19:47


NVD link : CVE-2026-35491

Mitre link : CVE-2026-35491

CVE.ORG link : CVE-2026-35491


JSON object : View

Products Affected

pi-hole

  • ftldns
CWE
CWE-863

Incorrect Authorization