CVE-2025-59151: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in pi-hole web
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface before 6.3 is vulnerable to Carriage Return Line Feed (CRLF) injection. When a request is made to a file ending with the .lp extension, the application performs a redirect without properly sanitizing the input. An attacker can inject carriage return and line feed characters (%0d%0a) to manipulate both the headers and the content of the HTTP response. This enables the injection of arbitrary HTTP response headers, potentially leading to session fixation, cache poisoning, and the weakening or bypassing of browser-based security mechanisms such as Content Security Policy or X-XSS-Protection. This vulnerability is fixed in 6.3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-59151 affects the Pi-hole Admin Interface, a web-based management console for Pi-hole, a popular network-level advertisement and tracker blocking application. Versions prior to 6.3 improperly handle requests to files ending with the .lp extension by performing HTTP redirects without sanitizing input containing carriage return and line feed characters (%0d%0a). This improper neutralization of CRLF sequences (CWE-93) allows attackers to inject arbitrary HTTP response headers. Such injection can manipulate HTTP responses to achieve session fixation, where an attacker sets a victim's session identifier; cache poisoning, where malicious content is cached by browsers or proxies; and weakening or bypassing browser security policies such as Content Security Policy (CSP) and X-XSS-Protection headers. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The CVSS v3.1 base score is 8.2 (high), reflecting the ease of exploitation and significant impact on integrity with limited impact on availability and no direct confidentiality loss. Although no known exploits are reported in the wild yet, the vulnerability poses a serious risk to the integrity of HTTP responses and the security posture of affected networks. The issue is resolved in Pi-hole version 6.3, which properly sanitizes input to prevent CRLF injection.
Potential Impact
For European organizations, exploitation of this vulnerability could undermine the security and reliability of Pi-hole deployments, which are widely used to block ads and trackers at the network level. Successful attacks may allow adversaries to hijack user sessions, poison caches to serve malicious content, or bypass browser security mechanisms, increasing the risk of further attacks such as cross-site scripting or data manipulation. This could lead to compromised user privacy, degraded network security, and potential exposure to malware or phishing campaigns. Organizations relying on Pi-hole for network security and privacy, including enterprises, educational institutions, and government agencies, may face increased risk of targeted attacks or broader network compromise. Given the remote and unauthenticated exploitability, the threat is particularly concerning for publicly accessible or poorly segmented Pi-hole admin interfaces.
Mitigation Recommendations
European organizations should immediately upgrade all Pi-hole Admin Interface installations to version 6.3 or later to remediate the vulnerability. If upgrading is not immediately feasible, organizations should restrict access to the Pi-hole admin interface by implementing network-level controls such as firewall rules or VPN access to limit exposure. Additionally, web application firewalls (WAFs) can be configured to detect and block HTTP requests containing CRLF injection patterns targeting .lp files. Monitoring HTTP logs for suspicious requests with encoded CRLF sequences (%0d%0a) can help detect attempted exploitation. Organizations should also review and enforce strict Content Security Policy headers and other browser security mechanisms to mitigate potential impacts. Regular vulnerability scanning and patch management processes should be enhanced to ensure timely updates of Pi-hole and other critical infrastructure components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Norway, Finland, Denmark, Belgium, Italy
CVE-2025-59151: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in pi-hole web
Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface before 6.3 is vulnerable to Carriage Return Line Feed (CRLF) injection. When a request is made to a file ending with the .lp extension, the application performs a redirect without properly sanitizing the input. An attacker can inject carriage return and line feed characters (%0d%0a) to manipulate both the headers and the content of the HTTP response. This enables the injection of arbitrary HTTP response headers, potentially leading to session fixation, cache poisoning, and the weakening or bypassing of browser-based security mechanisms such as Content Security Policy or X-XSS-Protection. This vulnerability is fixed in 6.3.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-59151 affects the Pi-hole Admin Interface, a web-based management console for Pi-hole, a popular network-level advertisement and tracker blocking application. Versions prior to 6.3 improperly handle requests to files ending with the .lp extension by performing HTTP redirects without sanitizing input containing carriage return and line feed characters (%0d%0a). This improper neutralization of CRLF sequences (CWE-93) allows attackers to inject arbitrary HTTP response headers. Such injection can manipulate HTTP responses to achieve session fixation, where an attacker sets a victim's session identifier; cache poisoning, where malicious content is cached by browsers or proxies; and weakening or bypassing browser security policies such as Content Security Policy (CSP) and X-XSS-Protection headers. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The CVSS v3.1 base score is 8.2 (high), reflecting the ease of exploitation and significant impact on integrity with limited impact on availability and no direct confidentiality loss. Although no known exploits are reported in the wild yet, the vulnerability poses a serious risk to the integrity of HTTP responses and the security posture of affected networks. The issue is resolved in Pi-hole version 6.3, which properly sanitizes input to prevent CRLF injection.
Potential Impact
For European organizations, exploitation of this vulnerability could undermine the security and reliability of Pi-hole deployments, which are widely used to block ads and trackers at the network level. Successful attacks may allow adversaries to hijack user sessions, poison caches to serve malicious content, or bypass browser security mechanisms, increasing the risk of further attacks such as cross-site scripting or data manipulation. This could lead to compromised user privacy, degraded network security, and potential exposure to malware or phishing campaigns. Organizations relying on Pi-hole for network security and privacy, including enterprises, educational institutions, and government agencies, may face increased risk of targeted attacks or broader network compromise. Given the remote and unauthenticated exploitability, the threat is particularly concerning for publicly accessible or poorly segmented Pi-hole admin interfaces.
Mitigation Recommendations
European organizations should immediately upgrade all Pi-hole Admin Interface installations to version 6.3 or later to remediate the vulnerability. If upgrading is not immediately feasible, organizations should restrict access to the Pi-hole admin interface by implementing network-level controls such as firewall rules or VPN access to limit exposure. Additionally, web application firewalls (WAFs) can be configured to detect and block HTTP requests containing CRLF injection patterns targeting .lp files. Monitoring HTTP logs for suspicious requests with encoded CRLF sequences (%0d%0a) can help detect attempted exploitation. Organizations should also review and enforce strict Content Security Policy headers and other browser security mechanisms to mitigate potential impacts. Regular vulnerability scanning and patch management processes should be enhanced to ensure timely updates of Pi-hole and other critical infrastructure components.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-09T15:23:16.327Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68ffcd8cba6dffc5e20add29
Added to database: 10/27/2025, 7:52:44 PM
Last enriched: 10/27/2025, 8:07:58 PM
Last updated: 10/27/2025, 11:08:55 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62258: CWE-352 Cross-Site Request Forgery (CSRF) in Liferay Portal
HighCVE-2025-62259: CWE-863 Incorrect Authorization in Liferay Portal
MediumCVE-2025-12334: Cross Site Scripting in code-projects E-Commerce Website
MediumCVE-2025-12333: Cross Site Scripting in code-projects E-Commerce Website
MediumCVE-2025-12331: Unrestricted Upload in Willow CMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.