Description
AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73.
Published: 2026-03-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

An unauthenticated remote attacker can bypass all authentication in AdGuard Home by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner multiplexer, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This flaw is identified as CWE‑287 and allows an attacker to gain full administrative control of the service.

Affected Systems

The vulnerability affects all installations of AdGuard Home running versions earlier than 0.107.73. The affected vendor is AdguardTeam:AdGuardHome, and the generic CPE identifier is cpe:2.3:a:adguard:adguardhome:*:*:*:*:*:*:*:.

Risk and Exploitability

The CVSS score of 9.8 classifies this as a critical vulnerability, while the EPSS score of less than 1% indicates a relatively low current exploitation probability. This flaw is not listed in the CISA KEV catalog. The likely attack vector is a remote, unauthenticated network attacker who can send a crafted HTTP/1.1 upgrade request to an internet‑facing AdGuard Home instance. Exploitation would give the attacker unrestricted administrative access to the service without any valid credentials.

Generated by OpenCVE AI on March 17, 2026 at 17:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AdGuard Home to version 0.107.73 or later.

Generated by OpenCVE AI on March 17, 2026 at 17:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5fg6-wrq4-w5gh AdGuard Home: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass
History

Fri, 13 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:adguard:adguardhome:*:*:*:*:*:*:*:*

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Adguard
Adguard adguardhome
Vendors & Products Adguard
Adguard adguardhome

Wed, 11 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73.
Title AdGuard Home: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Adguard Adguardhome
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T16:17:48.461Z

Reserved: 2026-03-10T22:19:36.546Z

Link: CVE-2026-32136

cve-icon Vulnrichment

Updated: 2026-03-12T15:11:05.153Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T22:16:33.423

Modified: 2026-03-13T20:19:00.987

Link: CVE-2026-32136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:50Z

Weaknesses