Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pi-hole web Interface
|
|
| CPEs | cpe:2.3:a:pi-hole:web_interface:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pi-hole web Interface
|
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pi-hole
Pi-hole web |
|
| Vendors & Products |
Pi-hole
Pi-hole web |
Mon, 06 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level ad and internet tracker blocking application. From 6.0 to before 6.5, a reflected DOM-based XSS vulnerability in taillog.js allows an unauthenticated attacker to inject arbitrary HTML into the Pi-hole admin interface by crafting a malicious URL. The file query parameter is interpolated into an innerHTML assignment without escaping. Because the Content-Security-Policy is missing the form-action directive, injected <form> elements can exfiltrate credentials to an external origin. This vulnerability is fixed in 6.5. | |
| Title | Pi-hole has a Reflected XSS / HTML injection in taillog.js | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:05:23.490Z
Reserved: 2026-03-19T17:02:34.170Z
Link: CVE-2026-33403
Updated: 2026-04-06T15:05:14.834Z
Status : Analyzed
Published: 2026-04-06T15:17:10.303
Modified: 2026-04-10T17:50:20.653
Link: CVE-2026-33403
No data.
OpenCVE Enrichment
Updated: 2026-04-13T14:27:46Z