CVE-2026-26952: CWE-20: Improper Input Validation in pi-hole web
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.4 and below are vulnerable to stored HTML injection through the local DNS records configuration page, which allows an authenticated administrator to inject code that is stored in the Pi-hole configuration and rendered every time the DNS records table is viewed. The populateDataTable() function contains a data variable with the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters. When an attacker supplies a value containing double quotes ("), they can prematurely “close” the data-tag attribute and inject additional HTML attributes into the element. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited. This issue has been fixed in version 6.4.1.
AI Analysis
Technical Summary
Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface for management. Versions 6.4 and earlier contain a stored HTML injection vulnerability (CVE-2026-26952) in the local DNS records configuration page. Specifically, the populateDataTable() JavaScript function uses a data variable containing the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters such as double quotes ("). An authenticated administrator can exploit this by entering a DNS record containing double quotes to prematurely close the data-tag attribute and inject additional HTML attributes or elements. Because the injected code is stored in the Pi-hole configuration, it is rendered every time the DNS records table is viewed, making this a persistent stored injection. Although Pi-hole enforces a Content Security Policy that blocks inline JavaScript, preventing script execution, the injected HTML can still manipulate the page's DOM, potentially leading to UI manipulation, phishing, or other attacks affecting confidentiality and integrity. The vulnerability requires authenticated administrator privileges, limiting the attack surface. No known exploits are currently reported in the wild. The issue was resolved in Pi-hole version 6.4.1 by properly escaping or sanitizing user input before insertion into HTML attributes.
Potential Impact
The vulnerability allows an authenticated administrator to inject arbitrary HTML code into the Pi-hole admin interface, which is then persistently displayed to any user viewing the DNS records table. While the CSP prevents inline JavaScript execution, the injected HTML could still be used to manipulate the user interface, potentially misleading administrators or causing confusion. This could lead to confidentiality risks if sensitive information is exposed or integrity risks if the interface is altered to misrepresent data. Since the vulnerability requires administrator authentication, the risk of external exploitation is reduced, but insider threats or compromised admin accounts could leverage this flaw. The impact on availability is minimal as the injection does not directly disrupt service. Organizations relying on Pi-hole for network-level ad blocking and DNS management could face trust and operational risks if attackers manipulate the admin interface. The medium CVSS score (5.4) reflects moderate impact and exploitability.
Mitigation Recommendations
Organizations should upgrade Pi-hole installations to version 6.4.1 or later, where this vulnerability is fixed by proper input sanitization and escaping. Until upgrading, administrators should restrict access to the Pi-hole admin interface to trusted personnel only and enforce strong authentication mechanisms to prevent unauthorized admin access. Regularly audit DNS record entries for suspicious or malformed inputs that could indicate attempted injection. Implement network segmentation and monitoring to detect unusual admin interface activity. Consider additional Content Security Policy enhancements or web application firewalls to detect and block injection attempts. Educate administrators about the risks of injecting untrusted data and the importance of applying security updates promptly. Backup Pi-hole configurations regularly to enable recovery from potential tampering.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-26952: CWE-20: Improper Input Validation in pi-hole web
Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.4 and below are vulnerable to stored HTML injection through the local DNS records configuration page, which allows an authenticated administrator to inject code that is stored in the Pi-hole configuration and rendered every time the DNS records table is viewed. The populateDataTable() function contains a data variable with the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters. When an attacker supplies a value containing double quotes ("), they can prematurely “close” the data-tag attribute and inject additional HTML attributes into the element. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited. This issue has been fixed in version 6.4.1.
AI-Powered Analysis
Technical Analysis
Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface for management. Versions 6.4 and earlier contain a stored HTML injection vulnerability (CVE-2026-26952) in the local DNS records configuration page. Specifically, the populateDataTable() JavaScript function uses a data variable containing the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters such as double quotes ("). An authenticated administrator can exploit this by entering a DNS record containing double quotes to prematurely close the data-tag attribute and inject additional HTML attributes or elements. Because the injected code is stored in the Pi-hole configuration, it is rendered every time the DNS records table is viewed, making this a persistent stored injection. Although Pi-hole enforces a Content Security Policy that blocks inline JavaScript, preventing script execution, the injected HTML can still manipulate the page's DOM, potentially leading to UI manipulation, phishing, or other attacks affecting confidentiality and integrity. The vulnerability requires authenticated administrator privileges, limiting the attack surface. No known exploits are currently reported in the wild. The issue was resolved in Pi-hole version 6.4.1 by properly escaping or sanitizing user input before insertion into HTML attributes.
Potential Impact
The vulnerability allows an authenticated administrator to inject arbitrary HTML code into the Pi-hole admin interface, which is then persistently displayed to any user viewing the DNS records table. While the CSP prevents inline JavaScript execution, the injected HTML could still be used to manipulate the user interface, potentially misleading administrators or causing confusion. This could lead to confidentiality risks if sensitive information is exposed or integrity risks if the interface is altered to misrepresent data. Since the vulnerability requires administrator authentication, the risk of external exploitation is reduced, but insider threats or compromised admin accounts could leverage this flaw. The impact on availability is minimal as the injection does not directly disrupt service. Organizations relying on Pi-hole for network-level ad blocking and DNS management could face trust and operational risks if attackers manipulate the admin interface. The medium CVSS score (5.4) reflects moderate impact and exploitability.
Mitigation Recommendations
Organizations should upgrade Pi-hole installations to version 6.4.1 or later, where this vulnerability is fixed by proper input sanitization and escaping. Until upgrading, administrators should restrict access to the Pi-hole admin interface to trusted personnel only and enforce strong authentication mechanisms to prevent unauthorized admin access. Regularly audit DNS record entries for suspicious or malformed inputs that could indicate attempted injection. Implement network segmentation and monitoring to detect unusual admin interface activity. Consider additional Content Security Policy enhancements or web application firewalls to detect and block injection attempts. Educate administrators about the risks of injecting untrusted data and the importance of applying security updates promptly. Backup Pi-hole configurations regularly to enable recovery from potential tampering.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6997966bd7880ec89b39b1c9
Added to database: 2/19/2026, 11:02:03 PM
Last enriched: 2/19/2026, 11:16:51 PM
Last updated: 2/20/2026, 11:59:44 PM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.