This behavior was present in the legacy AdminLTE interface and has since been patched in later versions.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19902 | An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 19 Nov 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pi-hole web Interface
|
|
| CPEs | cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pi-hole web Interface
|
Wed, 01 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Mon, 07 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 03 Jul 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions. | |
| Title | Pi-Hole AdminLTE Whitelist (now 'Web Allowlist') Remote Command Execution | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-19T14:36:48.677Z
Reserved: 2025-04-15T19:15:22.551Z
Link: CVE-2025-34087
Updated: 2025-07-07T19:08:51.400Z
Status : Analyzed
Published: 2025-07-03T20:15:22.843
Modified: 2025-10-01T14:08:35.893
Link: CVE-2025-34087
No data.
OpenCVE Enrichment
Updated: 2025-07-13T21:48:02Z
EUVD