Description
CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
INFO
Published Date :
2026-03-06T15:36:15.655Z
Last Modified :
2026-03-06T16:06:41.093Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-26017 vulnerability.
| Vendors | Products |
|---|---|
| Coredns.io |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26017.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact