CVE-2026-41489 PUBLISHED

Pi-hole: Local privilege escalation via config-controlled path in root-executed service hooks

Assigner: GitHub_M
Reserved: 20.04.2026 Published: 11.05.2026 Updated: 11.05.2026

Pi-hole is a DNS sinkhole that protects devices from unwanted content without installing any client-side software. From 6.0 to before Core 6.4.2 and FTL 6.6.1, two shell scripts executed as root by systemd (pihole-FTL-prestart.sh and pihole-FTL-poststop.sh) read the files.pid path from this config without validation and use it in privileged file operations (install and rm -f). By writing an arbitrary path into files.pid, an attacker with pihole privilege can cause root to delete and then recreate any file on the system outside the ProtectSystem=full-restricted directories, gaining write access to it. On a default Pi-hole installation this yields local privilege escalation to root via SSH authorized keys manipulation. If /root/.ssh/authorized_keys does not exist (default on fresh installs), only ExecStartPre is required. If the file exists, ExecStopPost deletes it first, and the same restart triggers both hooks in sequence. This vulnerability is fixed in Core 6.4.2 and FTL 6.6.1.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor pi-hole
Product pi-hole
Versions
  • Version >= 6.0, < 6.4.2 is affected

References

Problem Types

  • CWE-732: Incorrect Permission Assignment for Critical Resource CWE
  • CWE-269: Improper Privilege Management CWE
  • CWE-15: External Control of System or Configuration Setting CWE