CVE-2026-26952: CWE-20: Improper Input Validation in pi-hole web
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.4 and below are vulnerable to stored HTML injection through the local DNS records configuration page, which allows an authenticated administrator to inject code that is stored in the Pi-hole configuration and rendered every time the DNS records table is viewed. The populateDataTable() function contains a data variable with the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters. When an attacker supplies a value containing double quotes ("), they can prematurely “close” the data-tag attribute and inject additional HTML attributes into the element. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited. This issue has been fixed in version 6.4.1.
AI Analysis
Technical Summary
Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface. Versions 6.4 and earlier contain a stored HTML injection vulnerability (CVE-2026-26952) in the local DNS records configuration page. Specifically, the populateDataTable() JavaScript function uses a data variable containing the full DNS record value as entered by the user and returned by the API. This value is inserted directly into a data-tag HTML attribute without any escaping or sanitization of special characters such as double quotes. An authenticated administrator can supply a DNS record containing double quotes to prematurely close the data-tag attribute and inject arbitrary HTML attributes into the element. While Pi-hole enforces a Content Security Policy that blocks inline JavaScript, preventing direct script execution, the injected HTML could still alter the page structure or behavior in unexpected ways, potentially leading to UI manipulation or indirect attacks. The vulnerability requires administrator privileges to exploit and does not require user interaction. No known exploits are currently in the wild. The issue was addressed and fixed in Pi-hole version 6.4.1 by properly sanitizing input before rendering. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, and limited impact on confidentiality and integrity but no impact on availability.
Potential Impact
The vulnerability allows an authenticated administrator to inject arbitrary HTML attributes into the Pi-hole web interface, which could lead to UI manipulation or indirect attacks such as phishing or misleading information display. Although direct JavaScript execution is blocked by the Content Security Policy, the injected HTML could still be used to alter the interface in ways that confuse or mislead users or administrators. This could undermine trust in the management interface and potentially facilitate further attacks if combined with other vulnerabilities or social engineering. Since exploitation requires administrator privileges, the threat is limited to insiders or attackers who have already compromised admin credentials. The impact on confidentiality and integrity is low to moderate, and availability is unaffected. Organizations relying on Pi-hole for network-level ad blocking and DNS management could face reduced security assurance and potential administrative confusion until patched.
Mitigation Recommendations
1. Upgrade all Pi-hole installations to version 6.4.1 or later, where the vulnerability is fixed with proper input sanitization. 2. Restrict administrator access to trusted personnel only and enforce strong authentication mechanisms to reduce risk of credential compromise. 3. Regularly audit DNS records configured via the Pi-hole interface to detect any suspicious or malformed entries that could exploit this vulnerability. 4. Monitor Pi-hole web interface logs for unusual activity or configuration changes. 5. Consider implementing network segmentation to limit access to the Pi-hole admin interface. 6. Educate administrators about the risks of injecting untrusted input and the importance of applying security updates promptly. 7. If upgrading immediately is not possible, manually sanitize DNS record inputs before entry to avoid special characters like double quotes that enable injection.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-26952: CWE-20: Improper Input Validation in pi-hole web
Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.4 and below are vulnerable to stored HTML injection through the local DNS records configuration page, which allows an authenticated administrator to inject code that is stored in the Pi-hole configuration and rendered every time the DNS records table is viewed. The populateDataTable() function contains a data variable with the full DNS record value exactly as entered by the user and returned by the API. This value is inserted directly into the data-tag HTML attribute without any escaping or sanitization of special characters. When an attacker supplies a value containing double quotes ("), they can prematurely “close” the data-tag attribute and inject additional HTML attributes into the element. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited. This issue has been fixed in version 6.4.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface. Versions 6.4 and earlier contain a stored HTML injection vulnerability (CVE-2026-26952) in the local DNS records configuration page. Specifically, the populateDataTable() JavaScript function uses a data variable containing the full DNS record value as entered by the user and returned by the API. This value is inserted directly into a data-tag HTML attribute without any escaping or sanitization of special characters such as double quotes. An authenticated administrator can supply a DNS record containing double quotes to prematurely close the data-tag attribute and inject arbitrary HTML attributes into the element. While Pi-hole enforces a Content Security Policy that blocks inline JavaScript, preventing direct script execution, the injected HTML could still alter the page structure or behavior in unexpected ways, potentially leading to UI manipulation or indirect attacks. The vulnerability requires administrator privileges to exploit and does not require user interaction. No known exploits are currently in the wild. The issue was addressed and fixed in Pi-hole version 6.4.1 by properly sanitizing input before rendering. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, and limited impact on confidentiality and integrity but no impact on availability.
Potential Impact
The vulnerability allows an authenticated administrator to inject arbitrary HTML attributes into the Pi-hole web interface, which could lead to UI manipulation or indirect attacks such as phishing or misleading information display. Although direct JavaScript execution is blocked by the Content Security Policy, the injected HTML could still be used to alter the interface in ways that confuse or mislead users or administrators. This could undermine trust in the management interface and potentially facilitate further attacks if combined with other vulnerabilities or social engineering. Since exploitation requires administrator privileges, the threat is limited to insiders or attackers who have already compromised admin credentials. The impact on confidentiality and integrity is low to moderate, and availability is unaffected. Organizations relying on Pi-hole for network-level ad blocking and DNS management could face reduced security assurance and potential administrative confusion until patched.
Mitigation Recommendations
1. Upgrade all Pi-hole installations to version 6.4.1 or later, where the vulnerability is fixed with proper input sanitization. 2. Restrict administrator access to trusted personnel only and enforce strong authentication mechanisms to reduce risk of credential compromise. 3. Regularly audit DNS records configured via the Pi-hole interface to detect any suspicious or malformed entries that could exploit this vulnerability. 4. Monitor Pi-hole web interface logs for unusual activity or configuration changes. 5. Consider implementing network segmentation to limit access to the Pi-hole admin interface. 6. Educate administrators about the risks of injecting untrusted input and the importance of applying security updates promptly. 7. If upgrading immediately is not possible, manually sanitize DNS record inputs before entry to avoid special characters like double quotes that enable injection.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6997966bd7880ec89b39b1c9
Added to database: 2/19/2026, 11:02:03 PM
Last enriched: 2/28/2026, 2:46:59 PM
Last updated: 4/4/2026, 8:26:11 PM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.