Important updates have been released for the open-source ad blocker Pi-hole. Among other things, malware can get onto systems.
Pi-hole users are being urged to update their systems immediately after developers disclosed multiple security vulnerabilities that could expose networks to potential attacks. The widely used ad-blocking solution, which operates as a DNS sinkhole to block advertisements across entire home networks, has released critical patches addressing these issues.
Pi-hole is commonly deployed on Linux-based systems, often running on devices such as Raspberry Pi, and is valued for its ability to centrally block ads for all connected devices. However, its deep integration into network infrastructure also makes it an attractive target for threat actors seeking to exploit weaknesses in DNS-level services.
The latest update includes patches across all three core components of the platform – Core v6.4.1, FTL v6.6, and Web v6.5. In total, developers have addressed eleven vulnerabilities, ranging from medium- to high-severity issues. Among them are stored cross-site scripting (XSS) flaws, including CVE-2026-33403, which could allow attackers to inject malicious scripts into the system interface.
More concerning is a vulnerability identified as CVE-2026-33727, which could enable attackers with low-level access privileges to escalate their permissions and potentially gain root access. Such access would allow full control over the affected system, significantly increasing the risk of compromise.
The most critical issues involve high-severity vulnerabilities, including CVE-2026-35521, affecting the dhcp.hosts component of Pi-hole’s FTL engine. These flaws could be exploited remotely, although attackers would need prior authentication to execute an attack.
At present, there are no confirmed reports of these vulnerabilities being actively exploited in the wild. However, security experts strongly advise users not to delay applying the updates, as unpatched systems remain at risk.
Updating Pi-hole is a straightforward process that can be completed using the “pihole up” command. Early reports indicate that the update process is quick and stable, with no significant issues observed post-installation.
The disclosure highlights the importance of maintaining up-to-date security practices, even for tools designed to enhance privacy and protection. As cyber threats continue to evolve, timely patching remains one of the most effective defenses against potential exploitation.
Recommended Cyber Technology News :
- DPRK Hackers Deploy Modular Malware for Resilient Operations
- Microsoft Teams Fake Domains Used to Spread Malware
- Venom Stealer Malware Uses ClickFix for Continuous Data Theft
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





