CVE-2026-32936 PUBLISHED

CoreDNS DoH GET path missing size validation causes CPU and memory amplification

Assigner: GitHub_M
Reserved: 17.03.2026 Published: 05.05.2026 Updated: 05.05.2026

CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-over-HTTPS (DoH) GET path accepts oversized dns= query parameter values and performs URL query parsing, base64 decoding, and DNS message unpacking before rejecting the request. Unlike the POST path, which applies a bounded read via http.MaxBytesReader limited to 65536 bytes, the GET path has no equivalent size validation before expensive processing. A remote, unauthenticated attacker can repeatedly send oversized DoH GET requests to force high CPU usage, large transient memory allocations, and elevated garbage-collection pressure, leading to denial of service. This issue has been fixed in version 1.14.3.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor coredns
Product coredns
Versions
  • Version < 1.14.3 is affected

References

Problem Types

  • CWE-400: Uncontrolled Resource Consumption CWE