Vulnerability Description
Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable to cross-site scripting (XSS) via the Address field in the Subscribed Lists group management section. An authenticated user can inject malicious JavaScript by adding a payload to the Address field when creating or editing a list entry. The vulnerability is triggered when another user navigates to the Tools section and performs a gravity database update. The Address field does not properly sanitize input, allowing special characters and script tags to bypass validation. This has been patched in version 6.3.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pi-Hole | Web Interface | < 6.3 |
Related Weaknesses (CWE)
References
- https://github.com/pi-hole/web/security/advisories/GHSA-7w6h-3gwc-qhq5ExploitVendor Advisory
FAQ
What is CVE-2025-32785?
CVE-2025-32785 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Pi-hole Admin Interface is a web interface for managing Pi-hole, a network-level advertisement and internet tracker blocking application. Pi-hole Admin Interface versions prior to 6.3 are vulnerable t...
How severe is CVE-2025-32785?
CVE-2025-32785 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-32785?
Check the references section above for vendor advisories and patch information. Affected products include: Pi-Hole Web Interface.