Github.Com Coredns Coredns vulnerabilities

11 known vulnerabilities affecting github.com/coredns_coredns.

Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH6MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2026-26018HIGH≥ 0, < 1.14.22026-03-06
CVE-2026-26018 [HIGH] CWE-337 CoreDNS Loop Detection Denial of Service Vulnerability CoreDNS Loop Detection Denial of Service Vulnerability ## Executive Summary A Denial of Service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that te
ghsaosv
CVE-2026-26017HIGH≥ 0, < 1.14.22026-03-06
CVE-2026-26017 [HIGH] CWE-367 CoreDNS ACL Bypass CoreDNS ACL Bypass A logical vulnerability in CoreDNS allows DNS access controls to be bypassed due to the default execution order of plugins. Security plugins such as acl are evaluated before the rewrite plugin, resulting in a Time-of-Check Time-of-Use (TOCTOU) flaw. ### Impact In multi-tenant Kubernetes clusters, this flaw undermines DNS-based segmentation strategies. Example scenario: 1. ACL blocks access to *.admin.svc.cluster.local 2. A
ghsaosv
CVE-2025-68151HIGHCVSS 7.5≥ 0, < 1.14.02026-01-08
CVE-2025-68151 [HIGH] CWE-770 CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages CoreDNS gRPC/HTTPS/HTTP3 servers lack resource limits, enabling DoS via unbounded connections and oversized messages Multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, s
ghsaosv
CVE-2025-58063HIGH≥ 1.2.0, < 1.12.42025-09-09
CVE-2025-58063 [HIGH] CWE-681 CoreDNS: DNS Cache Pinning via etcd Lease ID Confusion CoreDNS: DNS Cache Pinning via etcd Lease ID Confusion # Summary The CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling cache pinning for very long periods. This can effectively cause a denial of service for DNS updates/changes to affected services. # Details In `plugin/etcd/etcd.go`, the `TTL()` function casts the 64-bit etcd lease ID to a
ghsaosv
CVE-2025-47950HIGH≥ 0, < 1.12.22025-06-06
CVE-2025-47950 [HIGH] CWE-770 CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification CoreDNS Vulnerable to DoQ Memory Exhaustion via Stream Amplification ### Summary A **Denial of Service (DoS)** vulnerability was discovered in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open
ghsaosv
CVE-2023-28452HIGH≥ 0, < 1.11.02024-09-18
CVE-2023-28452 [HIGH] CWE-290 CoreDNS vulnerable to TuDoor Attacks CoreDNS vulnerable to TuDoor Attacks An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.
ghsaosv
CVE-2023-30464MEDIUM≥ 0, ≤ 1.10.12024-09-18
CVE-2023-30464 [MEDIUM] CWE-290 CoreDNS Cache Poisoning via a birthday attack CoreDNS Cache Poisoning via a birthday attack CoreDNS through 1.10.1 enables attackers to achieve DNS cache poisoning and inject fake responses via a birthday attack.
ghsaosv
CVE-2024-0874MEDIUM≥ 0, < 1.11.22024-04-25
CVE-2024-0874 [MEDIUM] CWE-524 CoreDNS may return invalid cache entries CoreDNS may return invalid cache entries A flaw was found in coredns. This issue could lead to invalid cache entries returning due to incorrectly implemented caching.
ghsaosv
CVE-2022-2835MEDIUM≥ 0, ≤ 1.9.32023-03-03
CVE-2022-2835 [MEDIUM] CWE-923 coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints A flaw was found in coreDNS. This flaw allows a malicious user to reroute internal calls to some internal services that were accessed by the FQDN in a format of ..svc.
ghsaosv
CVE-2022-2837MEDIUM≥ 0, ≤ 1.9.32023-03-03
CVE-2022-2837 [MEDIUM] CWE-601 coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.
ghsaosv
CVE-2019-19794MEDIUMCVSS 5.9≥ 0, < 1.6.62022-03-01
CVE-2019-19794 [MEDIUM] CWE-330 Improper random number generation in github.com/coredns/coredns Improper random number generation in github.com/coredns/coredns ### Impact CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. ### Patches The problem has been fixed in 1.6.6+. ### References - [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794) ### For more i
ghsaosv