๐Ÿ” CVE Alert

CVE-2025-34087

UNKNOWN 0.0

Pi-Hole AdminLTE Whitelist (now 'Web Allowlist') Remote Command Execution

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An authenticated command injection vulnerability exists in Pi-hole versions up to 3.3. When adding a domain to the allowlist via the web interface, the domain parameter is not properly sanitized, allowing an attacker to append OS commands to the domain string. These commands are executed on the underlying operating system with the privileges of the Pi-hole service user. This behavior was present in the legacy AdminLTE interface and has since been patched in later versions.

CWE CWE-78
Vendor pi-hole llc
Product web
Published Jul 3, 2025
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for pi-hole llc web

Be the first to know when new unknown vulnerabilities affecting pi-hole llc web are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Pi-hole LLC / Web
* โ‰ค 3.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/http/pihole_whitelist_exec.rb pi-hole.net: https://pi-hole.net/ github.com: https://github.com/pi-hole/web/releases/tag/v4.0 pulsesecurity.co.nz: https://pulsesecurity.co.nz/advisories/pihole-v3.3-vulns vulncheck.com: https://vulncheck.com/advisories/pihole-adminlte-whitelist-rce

Credits

Denis Andzakovic