CVE-2025-53533
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-12-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pi-hole | web_interface | to 6.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a reflected cross-site scripting (XSS) issue in the Pi-hole Admin Interface versions 6.2.1 and earlier. It occurs because the 404 error page includes the requested URL path in the body tag's class attribute without properly sanitizing or escaping it. An attacker can craft a malicious URL containing JavaScript code that executes when a victim visits the link, allowing the attacker to run arbitrary code in the victim's browser. This vulnerability has been fixed in version 6.3.
How can this vulnerability impact me? :
If an attacker successfully exploits this vulnerability, they can execute arbitrary JavaScript code in the victim's browser when the victim visits a maliciously crafted URL. This can lead to theft of sensitive information, session hijacking, or other malicious actions performed in the context of the victim's browser session with the Pi-hole Admin Interface.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the Pi-hole Admin Interface to version 6.3 or later, as this version contains the patch that fixes the reflected cross-site scripting (XSS) vulnerability.