CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
References
| Link | Resource |
|---|---|
| https://github.com/coredns/coredns/releases/tag/v1.14.2 | Product Release Notes |
| https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr | Mitigation Vendor Advisory |
Configurations
History
09 Mar 2026, 20:31
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Coredns.io coredns
Coredns.io |
|
| CPE | cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:* | |
| References | () https://github.com/coredns/coredns/releases/tag/v1.14.2 - Product, Release Notes | |
| References | () https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr - Mitigation, Vendor Advisory |
06 Mar 2026, 16:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 16:16
Updated : 2026-03-09 20:31
NVD link : CVE-2026-26017
Mitre link : CVE-2026-26017
CVE.ORG link : CVE-2026-26017
JSON object : View
Products Affected
coredns.io
- coredns
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition
