๐Ÿ” CVE Alert

CVE-2026-41489

HIGH 8.8

Pi-hole: Local privilege escalation via config-controlled path in root-executed service hooks

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. From 6.0 to before Core 6.4.2 and FTL 6.6.1, two shell scripts executed as root by systemd (pihole-FTL-prestart.sh and pihole-FTL-poststop.sh) read the files.pid path from this config without validation and use it in privileged file operations (install and rm -f). By writing an arbitrary path into files.pid, an attacker with pihole privilege can cause root to delete and then recreate any file on the system outside the ProtectSystem=full-restricted directories, gaining write access to it. On a default Pi-hole installation this yields local privilege escalation to root via SSH authorized keys manipulation. If /root/.ssh/authorized_keys does not exist (default on fresh installs), only ExecStartPre is required. If the file exists, ExecStopPost deletes it first, and the same restart triggers both hooks in sequence. This vulnerability is fixed in Core 6.4.2 and FTL 6.6.1.

CWE CWE-732 CWE-269 CWE-15
Vendor pi-hole
Product pi-hole
Published May 11, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for pi-hole pi-hole

Be the first to know when new high vulnerabilities affecting pi-hole pi-hole are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

pi-hole / pi-hole
>= 6.0, < 6.4.2

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/pi-hole/pi-hole/security/advisories/GHSA-6w8x-p785-6pm4