CVE-2026-26017

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*

History

09 Mar 2026, 20:31

Type Values Removed Values Added
First Time Coredns.io coredns
Coredns.io
CPE cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*
References () https://github.com/coredns/coredns/releases/tag/v1.14.2 - () https://github.com/coredns/coredns/releases/tag/v1.14.2 - Product, Release Notes
References () https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr - () https://github.com/coredns/coredns/security/advisories/GHSA-c9v3-4pv7-87pr - Mitigation, Vendor Advisory

06 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-06 16:16

Updated : 2026-03-09 20:31


NVD link : CVE-2026-26017

Mitre link : CVE-2026-26017

CVE.ORG link : CVE-2026-26017


JSON object : View

Products Affected

coredns.io

  • coredns
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition