← Back to CVEs
CVE-2025-34087
HIGH8.8
Description
An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published7/3/2025
Last Modified10/1/2025
Sourcenvd
Honeypot Sightings0
Affected Products
pi-hole:pi-hole
Weaknesses (CWE)
CWE-78
References
https://github.com/pi-hole/web/releases/tag/v4.0(disclosure@vulncheck.com)
https://pi-hole.net/(disclosure@vulncheck.com)
https://pulsesecurity.co.nz/advisories/pihole-v3.3-vulns(disclosure@vulncheck.com)
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/pihole_whitelist_exec.rb(disclosure@vulncheck.com)
https://vulncheck.com/advisories/pihole-adminlte-whitelist-rce(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.