#VU125386 Improper access control in Pi-hole - CVE-2026-33727
Published: April 8, 2026
Pi-hole
Pi-hole
Description
The vulnerability allows a local privileged user to escalate privileges.
The vulnerability exists due to improper access control in root-run Pi-hole scripts when sourcing /etc/pihole/versions. A local privileged user can modify the writable file to escalate privileges.
Exploitation requires prior code execution as the pihole account and a system where root executes Pi-hole scripts, such as via cron or administrative use.