CVE-2025-59151
BaseFortify
Publication date: 2025-10-27
Last updated on: 2025-12-18
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pi-hole | web_interface | to 6.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-113 | The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers. |
| CWE-93 | The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Carriage Return Line Feed (CRLF) injection in the Pi-hole Admin Interface before version 6.3. When a request is made to a file ending with the .lp extension, the application redirects without properly sanitizing input. An attacker can inject carriage return and line feed characters (%0d%0a) to manipulate HTTP response headers and content, allowing injection of arbitrary HTTP headers. This can lead to session fixation, cache poisoning, and bypassing browser security mechanisms like Content Security Policy or X-XSS-Protection.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to manipulate HTTP response headers, which can result in session fixation (taking over user sessions), cache poisoning (serving malicious content), and weakening or bypassing browser security features. These impacts can compromise the security and integrity of your network-level advertisement and tracker blocking managed by Pi-hole.
What immediate steps should I take to mitigate this vulnerability?
Upgrade the Pi-hole Admin Interface to version 6.3 or later, as this version contains the fix for the CRLF injection vulnerability.