An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user.
This behavior was present in the legacy AdminLTE interface and has since been patched in later versions.
Metrics
Affected Vendors & Products
References
History
Thu, 03 Jul 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions. | |
Title | Pi-Hole AdminLTE Whitelist (now 'Web Allowlist') Remote Command Execution | |
Weaknesses | CWE-78 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-03T19:46:49.017Z
Updated: 2025-07-03T19:46:49.017Z
Reserved: 2025-04-15T19:15:22.551Z
Link: CVE-2025-34087

No data.

Status : Received
Published: 2025-07-03T20:15:22.843
Modified: 2025-07-03T20:15:22.843
Link: CVE-2025-34087

No data.