CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c9v3-4pv7-87pr CoreDNS ACL Bypass
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 07 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 06 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.
Title CoreDNS ACL Bypass
Weaknesses CWE-367
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-06T16:06:41.093Z

Reserved: 2026-02-09T21:36:29.554Z

Link: CVE-2026-26017

cve-icon Vulnrichment

Updated: 2026-03-06T16:06:35.183Z

cve-icon NVD

Status : Received

Published: 2026-03-06T16:16:10.397

Modified: 2026-03-06T16:16:10.397

Link: CVE-2026-26017

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-06T15:36:15Z

Links: CVE-2026-26017 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses