Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable to cross-site scripting (XSS) via the Address field in the Subscribed Lists group management section. An authenticated user can inject malicious JavaScript by adding a payload to the Address field when creating or editing a list entry. The vulnerability is triggered when another user navigates to the Tools section and performs a gravity database update. The Address field does not properly sanitize input, allowing special characters and script tags to bypass validation. This has been patched in version 6.3.
Published: 2025-10-27
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 18 Dec 2025 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Tue, 28 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Pi-hole
Pi-hole pi-hole
Pi-hole web Interface
Vendors & Products Pi-hole
Pi-hole pi-hole
Pi-hole web Interface

Mon, 27 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 19:00:00 +0000

Type Values Removed Values Added
Description Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable to cross-site scripting (XSS) via the Address field in the Subscribed Lists group management section. An authenticated user can inject malicious JavaScript by adding a payload to the Address field when creating or editing a list entry. The vulnerability is triggered when another user navigates to the Tools section and performs a gravity database update. The Address field does not properly sanitize input, allowing special characters and script tags to bypass validation. This has been patched in version 6.3.
Title Pi-hole Admin Interface vulnerable to persistent XSS on Subscribed lists group management (Adress Field)
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Pi-hole Pi-hole Web Interface
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-27T19:40:38.991Z

Reserved: 2025-04-10T12:51:12.279Z

Link: CVE-2025-32785

cve-icon Vulnrichment

Updated: 2025-10-27T19:40:29.290Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-27T19:16:03.123

Modified: 2025-12-18T16:18:10.760

Link: CVE-2025-32785

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-28T10:24:31Z

Weaknesses