Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web

0
Medium
VulnerabilityCVE-2026-26953cvecve-2026-26953cwe-20cwe-116cwe-79
Published: Thu Feb 19 2026 (02/19/2026, 22:50:08 UTC)
Source: CVE Database V5
Vendor/Project: pi-hole
Product: web

Description

Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.0 and above have a Stored HTML Injection vulnerability in the active sessions table located on the API settings page, allowing an attacker with valid credentials to inject arbitrary HTML code that will be rendered in the browser of any administrator who visits the active sessions page. The rowCallback function contains the value data.x_forwarded_for, which is directly concatenated into an HTML string and inserted into the DOM using jQuery’s .html() method. This method interprets the content as HTML, which means that any HTML tags present in the value will be parsed and rendered by the browser. An attacker can use common tools such as curl, wget, Python requests, Burp Suite, or even JavaScript fetch() to send an authentication request with an X-Forwarded-For header that contains malicious HTML code instead of a legitimate IP address. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited to pure HTML injection without the ability to execute scripts. This issue has been fixed in version 6.4.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:47:14 UTC

Technical Analysis

Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface. Versions 6.0 through prior to 6.4.1 contain a stored HTML injection vulnerability (CVE-2026-26953) in the active sessions table on the API settings page. The vulnerability stems from improper input validation (CWE-20) and improper neutralization of input during web page generation (CWE-116), specifically in the handling of the X-Forwarded-For HTTP header. The value of this header is assigned to data.x_forwarded_for and directly concatenated into an HTML string that is inserted into the DOM using jQuery’s .html() method. This method interprets the content as HTML, allowing any embedded HTML tags to be rendered by the browser. An attacker with valid credentials can craft an authentication request with a malicious X-Forwarded-For header containing arbitrary HTML code, which will be stored and displayed to any administrator viewing the active sessions page. Although the injected code cannot execute JavaScript due to Pi-hole’s Content Security Policy that blocks inline scripts, the attacker can still manipulate the HTML structure, potentially causing UI disruptions or misleading content display. Exploitation requires valid user credentials but no additional user interaction beyond viewing the page. The vulnerability affects all Pi-hole web versions before 6.4.1 and was publicly disclosed in February 2026. No known exploits in the wild have been reported. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The flaw impacts integrity and availability but not confidentiality.

Potential Impact

This vulnerability allows authenticated attackers to inject arbitrary HTML into the Pi-hole admin interface, potentially misleading administrators or disrupting the user interface. While the Content Security Policy prevents JavaScript execution, the injected HTML could be used to spoof UI elements, display misleading information, or cause rendering issues that impair administrative functions. This can reduce the integrity of the admin interface and availability if the UI becomes unusable or confusing. Organizations relying on Pi-hole for network-wide ad and tracker blocking may face operational disruptions or increased risk of misconfiguration due to compromised admin interface integrity. Since exploitation requires valid credentials, insider threats or compromised accounts pose the greatest risk. The vulnerability does not directly expose sensitive data or allow remote code execution, limiting its impact compared to more severe injection flaws. However, the widespread use of Pi-hole in home, SMB, and enterprise environments means many organizations could be affected if they do not update promptly.

Mitigation Recommendations

1. Upgrade all Pi-hole installations to version 6.4.1 or later, where this vulnerability is fixed. 2. Enforce strong authentication and access controls to limit the number of users with admin credentials, reducing the risk of insider exploitation. 3. Monitor and audit admin interface access logs for suspicious activity, especially unusual X-Forwarded-For header values or repeated access to the active sessions page. 4. Consider implementing additional input validation or sanitization on proxy or web server layers to filter out malicious header values before they reach Pi-hole. 5. Educate administrators about the risk of this vulnerability and encourage cautious review of active sessions data. 6. If upgrading immediately is not possible, restrict network access to the Pi-hole admin interface to trusted IPs and VPNs to reduce exposure. 7. Regularly review and apply security patches for Pi-hole and related infrastructure components.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-16T22:20:28.611Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699799f2d7880ec89b3a60cd

Added to database: 2/19/2026, 11:17:06 PM

Last enriched: 2/28/2026, 2:47:14 PM

Last updated: 4/3/2026, 5:15:11 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses