Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34087: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Pi-hole LLC Web

0
Critical
VulnerabilityCVE-2025-34087cvecve-2025-34087cwe-78
Published: Thu Jul 03 2025 (07/03/2025, 19:46:49 UTC)
Source: CVE Database V5
Vendor/Project: Pi-hole LLC
Product: Web

Description

An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions.

AI-Powered Analysis

AILast updated: 11/19/2025, 13:14:08 UTC

Technical Analysis

CVE-2025-34087 is an authenticated OS command injection vulnerability identified in Pi-hole LLC's web interface, specifically affecting versions up to 3.3 that use the legacy AdminLTE interface. The vulnerability arises due to improper neutralization of special elements in the 'domain' parameter when adding entries to the allowlist via the web UI. This parameter is not properly sanitized, allowing an attacker with authenticated access to append arbitrary OS commands to the domain string. These commands are executed with the privileges of the Pi-hole service user, which typically runs with limited but significant system permissions. The vulnerability is classified under CWE-78, indicating improper neutralization of OS command elements. Exploitation requires authentication but no additional user interaction, and the attack vector is network-based (remote). The CVSS v4.0 score of 9 (critical) reflects the high impact on confidentiality, integrity, and availability, as successful exploitation can lead to full system compromise, data exfiltration, or disruption of DNS filtering services. The vulnerability was present in the legacy AdminLTE interface and has been patched in versions released after 3.3. No public exploit code or active exploitation has been reported yet. The vulnerability was reserved in April 2025 and published in July 2025. Due to the nature of Pi-hole as a widely used network-level ad and tracker blocking solution, exploitation could allow attackers to pivot within networks or disrupt critical DNS filtering functions.

Potential Impact

For European organizations, the impact of CVE-2025-34087 can be significant. Pi-hole is commonly deployed in enterprise and small-to-medium business environments as a DNS-level ad blocker and network filter. Exploitation could allow attackers to execute arbitrary commands on the host system, potentially leading to full compromise of the Pi-hole server. This could result in unauthorized access to internal network resources, interception or manipulation of DNS queries, and disruption of network services. Confidentiality could be breached if attackers access sensitive network data or credentials stored or accessible on the Pi-hole host. Integrity and availability of DNS filtering services could be compromised, impacting user productivity and security posture. Given the critical CVSS score and the fact that the vulnerability requires only authenticated access, insider threats or compromised credentials could facilitate exploitation. European organizations with regulatory requirements around data protection (e.g., GDPR) may face compliance risks if exploitation leads to data breaches. The absence of known exploits in the wild suggests a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Upgrade Pi-hole installations to versions later than 3.3 where the vulnerability has been patched. 2. Restrict access to the Pi-hole web interface using network segmentation, VPNs, or IP whitelisting to limit authenticated access only to trusted administrators. 3. Enforce strong authentication mechanisms and regularly audit user accounts with access to the Pi-hole admin interface to prevent unauthorized access. 4. Monitor Pi-hole logs for unusual activity related to allowlist modifications or command execution attempts. 5. Consider running Pi-hole with the least privileges necessary and in containerized or sandboxed environments to limit the impact of potential exploitation. 6. Implement network-level monitoring and intrusion detection systems to detect anomalous DNS or command execution behaviors. 7. Educate administrators on the risks of using legacy interfaces and the importance of timely patching. 8. If immediate upgrade is not possible, disable the allowlist feature or restrict its usage until patched versions can be deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.551Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6866dff66f40f0eb729b624c

Added to database: 7/3/2025, 7:54:30 PM

Last enriched: 11/19/2025, 1:14:08 PM

Last updated: 11/22/2025, 5:07:19 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats