Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, a reflected DOM-based XSS vulnerability in taillog.js allows an unauthenticated attacker to inject arbitrary HTML into the Pi-hole admin interface by crafting a malicious URL. The file query parameter is interpolated into an innerHTML assignment without escaping. Because the Content-Security-Policy is missing the form-action directive, injected <form> elements can exfiltrate credentials to an external origin. This vulnerability is fixed in 6.5.
Published: 2026-04-06
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected DOM‑based XSS with potential credential exfiltration
Action: Immediate Patch
AI Analysis

Impact

A reflected DOM‑based cross‑site scripting flaw exists in the taillog.js file of the Pi‑hole admin interface. The script retrieves a query parameter and assigns it directly to an innerHTML property without any escaping or sanitisation. This allows an attacker to inject arbitrary HTML and JavaScript into the page. Because the Content‑Security‑Policy header is missing a form‑action directive, malicious <form> elements can be inserted and used to exfiltrate credentials to an external domain.

Affected Systems

The vulnerability affects the Pi‑hole web interface in all releases from version 6.0 up to, but not including, 6.5. Any installation of Pi‑hole using those versions and exposing the admin interface to untrusted networks is exposed.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. The EPSS score of less than 1% suggests a low likelihood of mass exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. An unauthenticated attacker can exploit the flaw simply by crafting a malicious URL and luring a legitimate user to the Pi‑hole admin interface, making it a straightforward local or network attack vector.

Generated by OpenCVE AI on April 10, 2026 at 19:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Pi‑hole to version 6.5 or later and restart the web service.
  • Validate that the upgrade is successful by accessing the admin interface.
  • If an immediate upgrade is not feasible, restrict inbound traffic to the Pi‑hole admin port using a firewall or VPN, limiting exposure to trusted administrators.
  • As a temporary measure, modify taillog.js to escape the query parameter before inserting it into innerHTML, or add a form‑action directive to the Content‑Security‑Policy header to block external form submissions.

Generated by OpenCVE AI on April 10, 2026 at 19:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Pi-hole web Interface
CPEs cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*
Vendors & Products Pi-hole web Interface

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Pi-hole
Pi-hole web
Vendors & Products Pi-hole
Pi-hole web

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, a reflected DOM-based XSS vulnerability in taillog.js allows an unauthenticated attacker to inject arbitrary HTML into the Pi-hole admin interface by crafting a malicious URL. The file query parameter is interpolated into an innerHTML assignment without escaping. Because the Content-Security-Policy is missing the form-action directive, injected <form> elements can exfiltrate credentials to an external origin. This vulnerability is fixed in 6.5.
Title Pi-hole has a Reflected XSS / HTML injection in taillog.js
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Pi-hole Web Web Interface
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T15:05:23.490Z

Reserved: 2026-03-19T17:02:34.170Z

Link: CVE-2026-33403

cve-icon Vulnrichment

Updated: 2026-04-06T15:05:14.834Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T15:17:10.303

Modified: 2026-04-10T17:50:20.653

Link: CVE-2026-33403

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:46Z

Weaknesses