CVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.0 and above have a Stored HTML Injection vulnerability in the active sessions table located on the API settings page, allowing an attacker with valid credentials to inject arbitrary HTML code that will be rendered in the browser of any administrator who visits the active sessions page. The rowCallback function contains the value data.x_forwarded_for, which is directly concatenated into an HTML string and inserted into the DOM using jQuery’s .html() method. This method interprets the content as HTML, which means that any HTML tags present in the value will be parsed and rendered by the browser. An attacker can use common tools such as curl, wget, Python requests, Burp Suite, or even JavaScript fetch() to send an authentication request with an X-Forwarded-For header that contains malicious HTML code instead of a legitimate IP address. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited to pure HTML injection without the ability to execute scripts. This issue has been fixed in version 6.4.1.
AI Analysis
Technical Summary
Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface. Versions 6.0 through prior to 6.4.1 contain a stored HTML injection vulnerability (CVE-2026-26953) in the active sessions table on the API settings page. The vulnerability stems from improper input validation (CWE-20) and improper neutralization of input during web page generation (CWE-116), specifically in the handling of the X-Forwarded-For HTTP header. The value of this header is assigned to data.x_forwarded_for and directly concatenated into an HTML string that is inserted into the DOM using jQuery’s .html() method. This method interprets the content as HTML, allowing any embedded HTML tags to be rendered by the browser. An attacker with valid credentials can craft an authentication request with a malicious X-Forwarded-For header containing arbitrary HTML code, which will be stored and displayed to any administrator viewing the active sessions page. Although the injected code cannot execute JavaScript due to Pi-hole’s Content Security Policy that blocks inline scripts, the attacker can still manipulate the HTML structure, potentially causing UI disruptions or misleading content display. Exploitation requires valid user credentials but no additional user interaction beyond viewing the page. The vulnerability affects all Pi-hole web versions before 6.4.1 and was publicly disclosed in February 2026. No known exploits in the wild have been reported. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The flaw impacts integrity and availability but not confidentiality.
Potential Impact
This vulnerability allows authenticated attackers to inject arbitrary HTML into the Pi-hole admin interface, potentially misleading administrators or disrupting the user interface. While the Content Security Policy prevents JavaScript execution, the injected HTML could be used to spoof UI elements, display misleading information, or cause rendering issues that impair administrative functions. This can reduce the integrity of the admin interface and availability if the UI becomes unusable or confusing. Organizations relying on Pi-hole for network-wide ad and tracker blocking may face operational disruptions or increased risk of misconfiguration due to compromised admin interface integrity. Since exploitation requires valid credentials, insider threats or compromised accounts pose the greatest risk. The vulnerability does not directly expose sensitive data or allow remote code execution, limiting its impact compared to more severe injection flaws. However, the widespread use of Pi-hole in home, SMB, and enterprise environments means many organizations could be affected if they do not update promptly.
Mitigation Recommendations
1. Upgrade all Pi-hole installations to version 6.4.1 or later, where this vulnerability is fixed. 2. Enforce strong authentication and access controls to limit the number of users with admin credentials, reducing the risk of insider exploitation. 3. Monitor and audit admin interface access logs for suspicious activity, especially unusual X-Forwarded-For header values or repeated access to the active sessions page. 4. Consider implementing additional input validation or sanitization on proxy or web server layers to filter out malicious header values before they reach Pi-hole. 5. Educate administrators about the risk of this vulnerability and encourage cautious review of active sessions data. 6. If upgrading immediately is not possible, restrict network access to the Pi-hole admin interface to trusted IPs and VPNs to reduce exposure. 7. Regularly review and apply security patches for Pi-hole and related infrastructure components.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, India
CVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web
Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. Versions 6.0 and above have a Stored HTML Injection vulnerability in the active sessions table located on the API settings page, allowing an attacker with valid credentials to inject arbitrary HTML code that will be rendered in the browser of any administrator who visits the active sessions page. The rowCallback function contains the value data.x_forwarded_for, which is directly concatenated into an HTML string and inserted into the DOM using jQuery’s .html() method. This method interprets the content as HTML, which means that any HTML tags present in the value will be parsed and rendered by the browser. An attacker can use common tools such as curl, wget, Python requests, Burp Suite, or even JavaScript fetch() to send an authentication request with an X-Forwarded-For header that contains malicious HTML code instead of a legitimate IP address. Since Pi-hole implements a Content Security Policy (CSP) that blocks inline JavaScript, the impact is limited to pure HTML injection without the ability to execute scripts. This issue has been fixed in version 6.4.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Pi-hole is a popular network-level ad and tracker blocking application with a web-based admin interface. Versions 6.0 through prior to 6.4.1 contain a stored HTML injection vulnerability (CVE-2026-26953) in the active sessions table on the API settings page. The vulnerability stems from improper input validation (CWE-20) and improper neutralization of input during web page generation (CWE-116), specifically in the handling of the X-Forwarded-For HTTP header. The value of this header is assigned to data.x_forwarded_for and directly concatenated into an HTML string that is inserted into the DOM using jQuery’s .html() method. This method interprets the content as HTML, allowing any embedded HTML tags to be rendered by the browser. An attacker with valid credentials can craft an authentication request with a malicious X-Forwarded-For header containing arbitrary HTML code, which will be stored and displayed to any administrator viewing the active sessions page. Although the injected code cannot execute JavaScript due to Pi-hole’s Content Security Policy that blocks inline scripts, the attacker can still manipulate the HTML structure, potentially causing UI disruptions or misleading content display. Exploitation requires valid user credentials but no additional user interaction beyond viewing the page. The vulnerability affects all Pi-hole web versions before 6.4.1 and was publicly disclosed in February 2026. No known exploits in the wild have been reported. The CVSS v3.1 base score is 5.4, reflecting medium severity with network attack vector, low attack complexity, and privileges required. The flaw impacts integrity and availability but not confidentiality.
Potential Impact
This vulnerability allows authenticated attackers to inject arbitrary HTML into the Pi-hole admin interface, potentially misleading administrators or disrupting the user interface. While the Content Security Policy prevents JavaScript execution, the injected HTML could be used to spoof UI elements, display misleading information, or cause rendering issues that impair administrative functions. This can reduce the integrity of the admin interface and availability if the UI becomes unusable or confusing. Organizations relying on Pi-hole for network-wide ad and tracker blocking may face operational disruptions or increased risk of misconfiguration due to compromised admin interface integrity. Since exploitation requires valid credentials, insider threats or compromised accounts pose the greatest risk. The vulnerability does not directly expose sensitive data or allow remote code execution, limiting its impact compared to more severe injection flaws. However, the widespread use of Pi-hole in home, SMB, and enterprise environments means many organizations could be affected if they do not update promptly.
Mitigation Recommendations
1. Upgrade all Pi-hole installations to version 6.4.1 or later, where this vulnerability is fixed. 2. Enforce strong authentication and access controls to limit the number of users with admin credentials, reducing the risk of insider exploitation. 3. Monitor and audit admin interface access logs for suspicious activity, especially unusual X-Forwarded-For header values or repeated access to the active sessions page. 4. Consider implementing additional input validation or sanitization on proxy or web server layers to filter out malicious header values before they reach Pi-hole. 5. Educate administrators about the risk of this vulnerability and encourage cautious review of active sessions data. 6. If upgrading immediately is not possible, restrict network access to the Pi-hole admin interface to trusted IPs and VPNs to reduce exposure. 7. Regularly review and apply security patches for Pi-hole and related infrastructure components.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699799f2d7880ec89b3a60cd
Added to database: 2/19/2026, 11:17:06 PM
Last enriched: 2/28/2026, 2:47:14 PM
Last updated: 4/3/2026, 5:15:11 PM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.