Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34087: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Pi-hole LLC Web

0
Critical
VulnerabilityCVE-2025-34087cvecve-2025-34087cwe-78
Published: Thu Jul 03 2025 (07/03/2025, 19:46:49 UTC)
Source: CVE Database V5
Vendor/Project: Pi-hole LLC
Product: Web

Description

An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions.

AI-Powered Analysis

AILast updated: 11/26/2025, 14:09:14 UTC

Technical Analysis

CVE-2025-34087 is an authenticated OS command injection vulnerability affecting Pi-hole versions up to 3.3, specifically within the legacy AdminLTE web interface. The vulnerability arises due to improper neutralization of special elements in the 'domain' parameter when adding a domain to the allowlist via the web interface. Because the input is not properly sanitized, an attacker with authenticated access can append arbitrary OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user, which typically has elevated permissions sufficient to impact system integrity and availability. The vulnerability is classified under CWE-78, indicating improper neutralization of special elements used in OS commands. Exploitation does not require user interaction but does require authentication with low privileges, making it a significant threat in environments where attacker credentials or access are obtainable. The vulnerability was present in the legacy AdminLTE interface and has been patched in later Pi-hole versions. The CVSS v4.0 score of 9.0 reflects the vulnerability's critical nature, with network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild yet, but the potential for remote code execution and system compromise is substantial.

Potential Impact

For European organizations, the impact of CVE-2025-34087 can be severe. Pi-hole is widely used as a network-level DNS filtering solution to block ads, trackers, and malicious domains, often deployed in enterprise, government, and critical infrastructure environments. Exploitation of this vulnerability could allow attackers to execute arbitrary commands on DNS filtering servers, potentially leading to full system compromise, data exfiltration, disruption of DNS services, and lateral movement within internal networks. This could degrade network security posture, disrupt business operations, and expose sensitive information. Given the critical role of DNS in network operations, successful exploitation could also facilitate further attacks such as man-in-the-middle, phishing, or malware distribution. The requirement for authentication reduces the attack surface but does not eliminate risk, especially in cases of credential compromise or insider threats. The vulnerability's presence in legacy interfaces means organizations that have not updated or hardened their Pi-hole deployments remain at high risk.

Mitigation Recommendations

European organizations should immediately upgrade Pi-hole installations to the latest patched versions that address this vulnerability, removing legacy AdminLTE interfaces if possible. Implement strict access controls and multi-factor authentication for the Pi-hole web interface to reduce the risk of unauthorized access. Regularly audit user accounts and permissions to ensure only trusted users have access to the allowlist functionality. Employ network segmentation to isolate DNS filtering servers from general user networks and limit exposure. Monitor logs for unusual activity related to domain allowlist modifications or command execution attempts. Consider deploying web application firewalls (WAFs) or intrusion detection systems (IDS) with rules tuned to detect command injection patterns targeting Pi-hole interfaces. Conduct regular vulnerability assessments and penetration testing focused on DNS infrastructure. Finally, maintain an incident response plan that includes procedures for containment and remediation of DNS server compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.551Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6866dff66f40f0eb729b624c

Added to database: 7/3/2025, 7:54:30 PM

Last enriched: 11/26/2025, 2:09:14 PM

Last updated: 1/8/2026, 12:43:11 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats