AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73.

Project Subscriptions

Vendors Products
Adguard Subscribe
Adguardhome Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5fg6-wrq4-w5gh AdGuard Home: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Adguard
Adguard adguardhome
Vendors & Products Adguard
Adguard adguardhome

Wed, 11 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73.
Title AdGuard Home: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T16:17:48.461Z

Reserved: 2026-03-10T22:19:36.546Z

Link: CVE-2026-32136

cve-icon Vulnrichment

Updated: 2026-03-12T15:11:05.153Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T22:16:33.423

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-32136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-12T09:55:41Z

Weaknesses