πŸ” CVE Alert

CVE-2026-35491

MEDIUM 6.1

Pi-hole FTL: CLI API sessions can import Teleporter archives and modify configuration

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, Pi-hole FTL supports a CLI password feature (webserver.api.cli_pw) that creates β€œCLI” API sessions intended to be read-only for configuration changes. While /api/config correctly blocks CLI sessions from mutating configuration, /api/teleporter allowed Teleporter imports for CLI sessions, enabling a CLI-scoped session to overwrite configuration via a Teleporter archive (authorization bypass). This vulnerability is fixed in 6.6.

CWE CWE-863
Vendor pi-hole
Product ftl
Published Apr 7, 2026
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for pi-hole ftl

Be the first to know when new medium vulnerabilities affecting pi-hole ftl are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
Low

Affected Versions

pi-hole / FTL
>= 6.0, < 6.6

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/pi-hole/FTL/security/advisories/GHSA-r7g8-3fj7-m5qq