{"api_version":"1","generated_at":"2026-04-09T20:35:04+00:00","cve":"CVE-2026-35519","urls":{"html":"https://cve.report/CVE-2026-35519","api":"https://cve.report/api/cve/CVE-2026-35519.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-35519","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-35519"},"summary":{"title":"Pi-hole FTL affected by Remote Code Execution (RCE) via dns.hostRecord Newline Injection","description":"FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-04-07 16:16:28","updated_at":"2026-04-09 17:16:25"},"problem_types":["CWE-78","CWE-93","CWE-78 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","CWE-93 CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp","name":"https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-35519","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-35519","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"pi-hole","product":"FTL","version":"affected >= 6.0, < 6.6","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"35519","cve":"CVE-2026-35519","epss":"0.002030000","percentile":"0.424250000","score_date":"2026-04-08","updated_at":"2026-04-09 00:05:08"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-35519","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-09T16:12:50.932702Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-09T16:19:08.569Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"FTL","vendor":"pi-hole","versions":[{"status":"affected","version":">= 6.0, < 6.6"}]}],"descriptions":[{"lang":"en","value":"FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-93","description":"CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-07T15:18:27.377Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp","tags":["x_refsource_CONFIRM"],"url":"https://github.com/pi-hole/FTL/security/advisories/GHSA-wxhv-w77q-6qwp"}],"source":{"advisory":"GHSA-wxhv-w77q-6qwp","discovery":"UNKNOWN"},"title":"Pi-hole FTL affected by Remote Code Execution (RCE) via dns.hostRecord Newline Injection"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-35519","datePublished":"2026-04-07T15:18:27.377Z","dateReserved":"2026-04-03T02:15:39.280Z","dateUpdated":"2026-04-09T16:19:08.569Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-07 16:16:28","lastModifiedDate":"2026-04-09 17:16:25","problem_types":["CWE-78","CWE-93","CWE-78 CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","CWE-93 CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"35519","Ordinal":"1","Title":"Pi-hole FTL affected by Remote Code Execution (RCE) via dns.host","CVE":"CVE-2026-35519","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"35519","Ordinal":"1","NoteData":"FTLDNS (pihole-FTL) provides an interactive API and also generates statistics for Pi-hole's Web interface. From 6.0 to before 6.6, the Pi-hole FTL engine contains a Remote Code Execution (RCE) vulnerability in the DNS host record configuration parameter (dns.hostRecord). This vulnerability allows an authenticated attacker to inject arbitrary dnsmasq configuration directives through newline characters, ultimately achieving command execution on the underlying system. This vulnerability is fixed in 6.6.","Type":"Description","Title":"Pi-hole FTL affected by Remote Code Execution (RCE) via dns.host"}]}}}