Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, the formatInfo() function in queries.js renders data.upstream, data.client.ip, and data.ede.text into HTML without escaping when a user expands a query row in the Query Log, enabling stored HTML injection. JavaScript execution is blocked by the server's CSP (script-src 'self'). The same fields are properly escaped in the table view (rowCallback), confirming the omission was an oversight. This vulnerability is fixed in 6.5.
Published: 2026-04-06
Score: 3.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stored HTML injection in Pi‑hole Admin Interface query logs
Action: Apply Patch
AI Analysis

Impact

A stored cross‑site scripting vulnerability exists in the Pi‑hole Admin Interface. When a user expands a query row, the formatInfo() function renders unescaped data from the upstream, client IP, and ede.text fields into the page. The payload is stored and is displayed when the row is expanded. JavaScript execution is blocked by the server's CSP (script‑src 'self'), so direct script execution is precluded. The impact is therefore limited to malicious HTML content being displayed, which could include visual defacement or other non‑executing malicious content.

Affected Systems

Pi‑hole Web Interface versions 6.0 through 6.4 are affected. The issue is fixed in version 6.5 and later.

Risk and Exploitability

The CVSS score of 3.1 indicates low severity. The EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the KEV catalog. The attack vector is inferred to require an attacker who can inject arbitrary data into the query logs, such as via upstream traffic or client IP, before a user expands the row. Because the content is stored and the CSP blocks script execution, the risk is moderate and exploitation is unlikely in typical deployments, but the presence of unsanitized HTML could still affect the UI experience.

Generated by OpenCVE AI on April 9, 2026 at 19:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Pi‑hole Web Interface to version 6.5 or later, which includes the fix for the HTML injection issue.
  • If an upgrade is not immediately possible, modify the formatInfo() function in queries.js to properly escape all HTML output before rendering.
  • Periodically review the Query Log view for unexpected content and apply additional sanitization filters if necessary.
  • Stay informed of future Pi‑hole security advisories to ensure timely patching.

Generated by OpenCVE AI on April 9, 2026 at 19:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Pi-hole web Interface
CPEs cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:*
Vendors & Products Pi-hole web Interface

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Pi-hole
Pi-hole web
Vendors & Products Pi-hole
Pi-hole web

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, the formatInfo() function in queries.js renders data.upstream, data.client.ip, and data.ede.text into HTML without escaping when a user expands a query row in the Query Log, enabling stored HTML injection. JavaScript execution is blocked by the server's CSP (script-src 'self'). The same fields are properly escaped in the table view (rowCallback), confirming the omission was an oversight. This vulnerability is fixed in 6.5.
Title Pi-hole has a Stored HTML Injection in queries.js
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}


Subscriptions

Pi-hole Web Web Interface
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-06T18:37:49.276Z

Reserved: 2026-03-19T17:02:34.170Z

Link: CVE-2026-33405

cve-icon Vulnrichment

Updated: 2026-04-06T18:37:43.235Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-06T16:16:33.610

Modified: 2026-04-09T18:30:03.017

Link: CVE-2026-33405

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:45:09Z

Weaknesses