CVE-2026-26018

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that terminates the entire process. This issue has been patched in version 1.14.2.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*

History

09 Mar 2026, 20:32

Type Values Removed Values Added
First Time Coredns.io coredns
Coredns.io
CPE cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*
References () https://github.com/coredns/coredns/releases/tag/v1.14.2 - () https://github.com/coredns/coredns/releases/tag/v1.14.2 - Product, Release Notes
References () https://github.com/coredns/coredns/security/advisories/GHSA-h75p-j8xm-m278 - () https://github.com/coredns/coredns/security/advisories/GHSA-h75p-j8xm-m278 - Vendor Advisory, Exploit

06 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-06 16:16

Updated : 2026-03-09 20:32


NVD link : CVE-2026-26018

Mitre link : CVE-2026-26018

CVE.ORG link : CVE-2026-26018


JSON object : View

Products Affected

coredns.io

  • coredns
CWE
CWE-337

Predictable Seed in Pseudo-Random Number Generator (PRNG)

CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling