Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26952: CWE-20: Improper Input Validation in pi-hole web

0
Medium
VulnerabilityCVE-2026-26952cvecve-2026-26952cwe-20cwe-79cwe-116
Published: Thu Feb 19 2026 (02/19/2026, 22:43:58 UTC)
Source: CVE Database V5
Vendor/Project: pi-hole
Product: web

Description

Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.4 and below are vulnerable to stored HTML injection through the local DNS records configuration page, which allows an authenticated administrator to inject code that is stored in the Pi-hole configuration and rendered every time the DNS records table is viewed. The populateDataTable() function contains a data variable with the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters. When an attacker supplies a value containing double quotes ("), they can prematurely “close” the data-tag attribute and inject additional HTML attributes into the element. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited. This issue has been fixed in version 6.4.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:46:59 UTC

Technical Analysis

Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface. Versions 6.4 and earlier contain a stored HTML injection vulnerability (CVE-2026-26952) in the local DNS records configuration page. Specifically, the populateDataTable() JavaScript function uses a data variable containing the full DNS record value as entered by the user and returned by the API. This value is inserted directly into a data-tag HTML attribute without any escaping or sanitization of special characters such as double quotes. An authenticated administrator can supply a DNS record containing double quotes to prematurely close the data-tag attribute and inject arbitrary HTML attributes into the element. While Pi-hole enforces a Content Security Policy that blocks inline JavaScript, preventing direct script execution, the injected HTML could still alter the page structure or behavior in unexpected ways, potentially leading to UI manipulation or indirect attacks. The vulnerability requires administrator privileges to exploit and does not require user interaction. No known exploits are currently in the wild. The issue was addressed and fixed in Pi-hole version 6.4.1 by properly sanitizing input before rendering. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, and limited impact on confidentiality and integrity but no impact on availability.

Potential Impact

The vulnerability allows an authenticated administrator to inject arbitrary HTML attributes into the Pi-hole web interface, which could lead to UI manipulation or indirect attacks such as phishing or misleading information display. Although direct JavaScript execution is blocked by the Content Security Policy, the injected HTML could still be used to alter the interface in ways that confuse or mislead users or administrators. This could undermine trust in the management interface and potentially facilitate further attacks if combined with other vulnerabilities or social engineering. Since exploitation requires administrator privileges, the threat is limited to insiders or attackers who have already compromised admin credentials. The impact on confidentiality and integrity is low to moderate, and availability is unaffected. Organizations relying on Pi-hole for network-level ad blocking and DNS management could face reduced security assurance and potential administrative confusion until patched.

Mitigation Recommendations

1. Upgrade all Pi-hole installations to version 6.4.1 or later, where the vulnerability is fixed with proper input sanitization. 2. Restrict administrator access to trusted personnel only and enforce strong authentication mechanisms to reduce risk of credential compromise. 3. Regularly audit DNS records configured via the Pi-hole interface to detect any suspicious or malformed entries that could exploit this vulnerability. 4. Monitor Pi-hole web interface logs for unusual activity or configuration changes. 5. Consider implementing network segmentation to limit access to the Pi-hole admin interface. 6. Educate administrators about the risks of injecting untrusted input and the importance of applying security updates promptly. 7. If upgrading immediately is not possible, manually sanitize DNS record inputs before entry to avoid special characters like double quotes that enable injection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6997966bd7880ec89b39b1c9

Added to database: 2/19/2026, 11:02:03 PM

Last enriched: 2/28/2026, 2:46:59 PM

Last updated: 4/4/2026, 8:26:11 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses