Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c9v3-4pv7-87pr | CoreDNS ACL Bypass |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 07 Mar 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 06 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 06 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2. | |
| Title | CoreDNS ACL Bypass | |
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-06T16:06:41.093Z
Reserved: 2026-02-09T21:36:29.554Z
Link: CVE-2026-26017
Updated: 2026-03-06T16:06:35.183Z
Status : Received
Published: 2026-03-06T16:16:10.397
Modified: 2026-03-06T16:16:10.397
Link: CVE-2026-26017
OpenCVE Enrichment
No data.
Github GHSA