CVE-2026-26017: CoreDNS ACL Bypass via TOCTOU in Plugin Chain
Vulnerability ID: CVE-2026-26017
CVSS Score: 7.7
Published: 2026-03-06
A logical vulnerability in CoreDNS versions prior to 1.14.2 allows attackers to bypass access control lists (ACLs) via a Time-of-Check Time-of-Use (TOCTOU) flaw. The default plugin execution order processes security enforcement plugins (such as acl, firewall, and opa) before the rewrite plugin. Consequently, an attacker can query a permitted domain name that is subsequently rewritten to a restricted internal domain, bypassing the intended security policies and resolving the restricted target.
TL;DR
CoreDNS < 1.14.2 evaluates ACLs before rewriting query names. Attackers can query an allowed domain that rewrites to a restricted internal domain, bypassing security controls.
Technical Details
- CWE ID: CWE-367 (TOCTOU)
- Attack Vector: Network
- CVSS v3.1: 7.7 (High)
- Impact: ACL Bypass / Information Disclosure
- Exploit Status: No Active Exploitation
- Fixed Version: 1.14.2
Affected Systems
- CoreDNS < 1.14.2
- Kubernetes clusters using default CoreDNS images < 1.14.2
- Custom DNS deployments using
rewriteandaclplugins together -
CoreDNS: < 1.14.2 (Fixed in:
1.14.2)
Code Analysis
Commit: ccd88b2
Update miekg/dns to v1.1.72 for consistent normalization
go.mod updates and dependency upgrades
Mitigation Strategies
- Upgrade CoreDNS to version 1.14.2 or later.
- Manually reorder
plugin.cfgin custom builds to placerewritebeforeacl. - Audit existing rewrite rules to ensure no aliases point to sensitive internal targets without secondary protections.
Remediation Steps:
- Check the running CoreDNS version:
coredns -version. - If version is < 1.14.2, update the container image or binary to the latest stable release.
- If using a custom compiled version: Open
plugin.cfg. - Locate the
rewriteplugin line. - Move the
rewriteline strictly aboveacl,firewall, andopalines. - Re-run
makeorgo generate && go buildto produce the patched binary. - Deploy the new binary and verify plugin order by checking logs during startup (plugins load in the configured order).
References
Read the full report for CVE-2026-26017 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)