Cyber Posture

CVE-2026-32136

CriticalPublic PoC

Published: 11 March 2026

Published
11 March 2026
Modified
13 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0068 71.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

AdGuard Home is a network-wide software for blocking ads and tracking. Prior to 0.107.73, an unauthenticated remote attacker can bypass all authentication in AdGuardHome by sending an HTTP/1.1 request that requests an upgrade to HTTP/2 cleartext (h2c). Once the upgrade…

more

is accepted, the resulting HTTP/2 connection is handled by the inner mux, which has no authentication middleware attached. All subsequent HTTP/2 requests on that connection are processed as fully authenticated, regardless of whether any credentials were provided. This vulnerability is fixed in 0.107.73.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and correction of the specific authentication bypass flaw via h2c upgrade in AdGuard Home prior to version 0.107.73.

prevent

Mandates enforcement of approved authorizations on all system interfaces, including the inner HTTP/2 mux lacking authentication middleware.

prevent

Boundary protection at external interfaces can block or filter unauthorized HTTP/1.1 to h2c upgrade requests from remote attackers.

Security SummaryAI

CVE-2026-32136 affects AdGuard Home, a network-wide software for blocking ads and tracking, in versions prior to 0.107.73. The vulnerability is an authentication bypass (CWE-287) that allows an unauthenticated remote attacker to send an HTTP/1.1 request requesting an upgrade to HTTP/2 cleartext (h2c). Once the server accepts the upgrade, the resulting HTTP/2 connection is handled by an inner mux without authentication middleware, causing all subsequent HTTP/2 requests on that connection to be processed as fully authenticated, even without credentials. The issue has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Any unauthenticated remote attacker with network access to the AdGuard Home instance can exploit this vulnerability. By initiating the h2c upgrade and sending follow-up HTTP/2 requests, the attacker gains unauthorized full administrative access, enabling high-impact actions such as reading sensitive configuration data, modifying filtering rules, or disrupting service operations.

The vulnerability is fixed in AdGuard Home version 0.107.73. The official advisory on GitHub (GHSA-5fg6-wrq4-w5gh) details the patch and recommends immediate upgrading to the fixed version for mitigation.

Details

CWE(s)

Affected Products

adguard
adguardhome
≤ 0.107.73

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables unauthenticated remote exploitation of a public-facing AdGuard Home server via HTTP/2 upgrade to bypass authentication and gain full admin access, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References