Impact
The flaw resides in the DNS CNAME records configuration parameter (dns.cnameRecords). An attacker who is authenticated to the Pi‑hole FTL API can inject newline characters into this setting, causing arbitrary dnsmasq configuration directives to be written. This leads to command execution on the host operating system, representing a full remote code‑execution vulnerability.
Affected Systems
The issue affects Pi‑hole FTL versions 6.0 through any release before 6.6. The vulnerability is limited to the FTL engine and does not impact other components of Pi‑hole. Updating to FTL 6.6 or later removes the flaw.
Risk and Exploitability
The problem scores an 8.8 on CVSS, indicating high severity, while the EPSS score is unavailable. It is not listed in the CISA KEV catalog, suggesting no known public exploitation yet. The vulnerability can only be triggered by an authenticated user of the FTL API, but once authenticated, the attacker can execute arbitrary system commands via the injected configuration.
OpenCVE Enrichment