CVE-2026-26017Time-of-check Time-of-use (TOCTOU) Race Condition in Coredns

Severity
6.3MEDIUMNVD
EPSS
0.1%
top 81.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 6
Latest updateMar 10

Description

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. This issue has been patched in version 1.14.2.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 1.8 | Impact: 4.0

🔴Vulnerability Details

3
OSV
CoreDNS ACL Bypass in github.com/coredns/coredns2026-03-10
GHSA
CoreDNS ACL Bypass2026-03-06
OSV
CoreDNS ACL Bypass2026-03-06

📋Vendor Advisories

2
Microsoft
CoreDNS ACL Bypass2026-03-10
Red Hat
github.com/coredns/coredns: CoreDNS: DNS access control bypass due to plugin execution order flaw2026-03-06

🕵️Threat Intelligence

2
Bleepingcomputer
Microsoft March 2026 Patch Tuesday fixes 2 zero-days, 79 flaws2026-03-10
Wiz
CVE-2026-26017 Impact, Exploitability, and Mitigation Steps | Wiz