CVE-2026-26018 PUBLISHED

CoreDNS Loop Detection Denial of Service Vulnerability

Assigner: GitHub_M
Reserved: 09.02.2026 Published: 06.03.2026 Updated: 06.03.2026

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.2, a denial of service vulnerability exists in CoreDNS's loop detection plugin that allows an attacker to crash the DNS server by sending specially crafted DNS queries. The vulnerability stems from the use of a predictable pseudo-random number generator (PRNG) for generating a secret query name, combined with a fatal error handler that terminates the entire process. This issue has been patched in version 1.14.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor coredns
Product coredns
Versions
  • Version < 1.14.2 is affected

References

Problem Types

  • CWE-337: Predictable Seed in Pseudo-Random Number Generator (PRNG) CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling CWE
  • CWE-400: Uncontrolled Resource Consumption CWE