CVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web
CVE-2026-26953 is a stored HTML injection vulnerability in the Pi-hole Admin Interface versions prior to 6. 4. 1. It affects the active sessions table on the API settings page, allowing an attacker with valid credentials to inject arbitrary HTML via the X-Forwarded-For header. The vulnerability arises because the value of data. x_forwarded_for is directly inserted into the DOM using jQuery’s . html() method without proper sanitization. Due to Pi-hole's Content Security Policy blocking inline JavaScript, the injection is limited to HTML content without script execution. Exploitation requires authenticated access but no user interaction beyond viewing the active sessions page. This vulnerability can lead to integrity and availability impacts, such as UI manipulation or denial of service.
AI Analysis
Technical Summary
CVE-2026-26953 is a stored HTML injection vulnerability identified in the Pi-hole Admin Interface, specifically affecting versions earlier than 6.4.1. Pi-hole is a widely used network-level ad and tracker blocking application, and its web interface allows administrators to manage settings and monitor active sessions. The vulnerability exists in the active sessions table on the API settings page, where the application displays the value of the HTTP header X-Forwarded-For in the sessions list. The problem stems from the rowCallback function, which takes the data.x_forwarded_for value and directly concatenates it into an HTML string that is inserted into the DOM using jQuery’s .html() method. This method parses the content as HTML, meaning any HTML tags in the header value are rendered by the browser. An attacker with valid credentials can craft an HTTP request containing malicious HTML code in the X-Forwarded-For header using tools like curl, wget, Burp Suite, or JavaScript fetch(). When an administrator views the active sessions page, the injected HTML is rendered, leading to a stored HTML injection scenario. However, Pi-hole enforces a Content Security Policy (CSP) that blocks inline JavaScript execution, limiting the impact to HTML injection without script execution. Despite this limitation, the vulnerability can still be exploited to manipulate the UI, inject misleading content, or potentially disrupt the availability of the admin interface. The vulnerability is classified under CWE-20 (Improper Input Validation), CWE-116 (Improper Encoding or Escaping of Output), and CWE-79 (Cross-site Scripting), highlighting the root cause as insufficient input validation and output encoding. The CVSS v3.1 base score is 5.4 (medium severity), reflecting the need for authentication, lack of script execution, and limited scope of impact. No known exploits in the wild have been reported. The issue was publicly disclosed on February 19, 2026, and fixed in Pi-hole version 6.4.1.
Potential Impact
The primary impact of this vulnerability is on the integrity and availability of the Pi-hole Admin Interface. An attacker with valid credentials can inject arbitrary HTML content into the active sessions table, which will be rendered in the browsers of administrators viewing that page. Although the Content Security Policy prevents execution of injected JavaScript, the attacker can still manipulate the UI, potentially misleading administrators or causing confusion. This could lead to administrative errors or loss of trust in the interface. Additionally, crafted HTML could disrupt the display or functionality of the page, causing denial of service conditions for administrators. Since the vulnerability requires valid credentials, the risk is limited to insider threats or compromised accounts. However, given Pi-hole’s role in network-level ad and tracker blocking, disruption of its management interface could indirectly affect network security and monitoring. Organizations relying on Pi-hole for network filtering and security may experience reduced operational effectiveness or increased risk of misconfiguration if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Pi-hole to version 6.4.1 or later, where the issue has been fixed by properly sanitizing and encoding the X-Forwarded-For header before inserting it into the DOM. Until the upgrade can be performed, administrators should restrict access to the Pi-hole Admin Interface to trusted users only and enforce strong authentication mechanisms to reduce the risk of credential compromise. Network segmentation and firewall rules should limit access to the management interface from untrusted networks. Additionally, monitoring and alerting on unusual HTTP headers or suspicious activity in the admin interface logs can help detect exploitation attempts. Administrators should avoid clicking on or viewing the active sessions page if suspicious activity is suspected. Implementing web application firewalls (WAFs) that can detect and block injection attempts targeting the X-Forwarded-For header may provide an additional layer of defense. Finally, educating administrators about the risks of HTML injection and encouraging prompt patching practices will reduce exposure.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-26953: CWE-20: Improper Input Validation in pi-hole web
Description
CVE-2026-26953 is a stored HTML injection vulnerability in the Pi-hole Admin Interface versions prior to 6. 4. 1. It affects the active sessions table on the API settings page, allowing an attacker with valid credentials to inject arbitrary HTML via the X-Forwarded-For header. The vulnerability arises because the value of data. x_forwarded_for is directly inserted into the DOM using jQuery’s . html() method without proper sanitization. Due to Pi-hole's Content Security Policy blocking inline JavaScript, the injection is limited to HTML content without script execution. Exploitation requires authenticated access but no user interaction beyond viewing the active sessions page. This vulnerability can lead to integrity and availability impacts, such as UI manipulation or denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2026-26953 is a stored HTML injection vulnerability identified in the Pi-hole Admin Interface, specifically affecting versions earlier than 6.4.1. Pi-hole is a widely used network-level ad and tracker blocking application, and its web interface allows administrators to manage settings and monitor active sessions. The vulnerability exists in the active sessions table on the API settings page, where the application displays the value of the HTTP header X-Forwarded-For in the sessions list. The problem stems from the rowCallback function, which takes the data.x_forwarded_for value and directly concatenates it into an HTML string that is inserted into the DOM using jQuery’s .html() method. This method parses the content as HTML, meaning any HTML tags in the header value are rendered by the browser. An attacker with valid credentials can craft an HTTP request containing malicious HTML code in the X-Forwarded-For header using tools like curl, wget, Burp Suite, or JavaScript fetch(). When an administrator views the active sessions page, the injected HTML is rendered, leading to a stored HTML injection scenario. However, Pi-hole enforces a Content Security Policy (CSP) that blocks inline JavaScript execution, limiting the impact to HTML injection without script execution. Despite this limitation, the vulnerability can still be exploited to manipulate the UI, inject misleading content, or potentially disrupt the availability of the admin interface. The vulnerability is classified under CWE-20 (Improper Input Validation), CWE-116 (Improper Encoding or Escaping of Output), and CWE-79 (Cross-site Scripting), highlighting the root cause as insufficient input validation and output encoding. The CVSS v3.1 base score is 5.4 (medium severity), reflecting the need for authentication, lack of script execution, and limited scope of impact. No known exploits in the wild have been reported. The issue was publicly disclosed on February 19, 2026, and fixed in Pi-hole version 6.4.1.
Potential Impact
The primary impact of this vulnerability is on the integrity and availability of the Pi-hole Admin Interface. An attacker with valid credentials can inject arbitrary HTML content into the active sessions table, which will be rendered in the browsers of administrators viewing that page. Although the Content Security Policy prevents execution of injected JavaScript, the attacker can still manipulate the UI, potentially misleading administrators or causing confusion. This could lead to administrative errors or loss of trust in the interface. Additionally, crafted HTML could disrupt the display or functionality of the page, causing denial of service conditions for administrators. Since the vulnerability requires valid credentials, the risk is limited to insider threats or compromised accounts. However, given Pi-hole’s role in network-level ad and tracker blocking, disruption of its management interface could indirectly affect network security and monitoring. Organizations relying on Pi-hole for network filtering and security may experience reduced operational effectiveness or increased risk of misconfiguration if this vulnerability is exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should upgrade Pi-hole to version 6.4.1 or later, where the issue has been fixed by properly sanitizing and encoding the X-Forwarded-For header before inserting it into the DOM. Until the upgrade can be performed, administrators should restrict access to the Pi-hole Admin Interface to trusted users only and enforce strong authentication mechanisms to reduce the risk of credential compromise. Network segmentation and firewall rules should limit access to the management interface from untrusted networks. Additionally, monitoring and alerting on unusual HTTP headers or suspicious activity in the admin interface logs can help detect exploitation attempts. Administrators should avoid clicking on or viewing the active sessions page if suspicious activity is suspected. Implementing web application firewalls (WAFs) that can detect and block injection attempts targeting the X-Forwarded-For header may provide an additional layer of defense. Finally, educating administrators about the risks of HTML injection and encouraging prompt patching practices will reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-16T22:20:28.611Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699799f2d7880ec89b3a60cd
Added to database: 2/19/2026, 11:17:06 PM
Last enriched: 2/19/2026, 11:31:42 PM
Last updated: 2/20/2026, 12:27:55 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-26964: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in windmill-labs windmill
LowCVE-2026-26957: CWE-209: Generation of Error Message Containing Sensitive Information in abhinavxd github.com/abhinavxd/libredesk
MediumCVE-2026-26959: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in Alex4SSB ADB-Explorer
HighCVE-2026-26958: CWE-665: Improper Initialization in FiloSottile filippo.io/edwards25519
LowCVE-2026-2605: Insertion of Sensitive Information into Log File in Tanium TanOS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.