Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-5fg6-wrq4-w5gh | AdGuard Home: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass |
Fri, 13 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:adguard:adguardhome:*:*:*:*:*:*:*:* |
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Adguard
Adguard adguardhome |
|
| Vendors & Products |
Adguard
Adguard adguardhome |
Wed, 11 Mar 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73. | |
| Title | AdGuard Home: HTTP/2 Cleartext (h2c) Upgrade Authentication Bypass | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T16:17:48.461Z
Reserved: 2026-03-10T22:19:36.546Z
Link: CVE-2026-32136
Updated: 2026-03-12T15:11:05.153Z
Status : Analyzed
Published: 2026-03-11T22:16:33.423
Modified: 2026-03-13T20:19:00.987
Link: CVE-2026-32136
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:36:50Z
Github GHSA