Denial of Service Vulnerability in CoreDNS by a Leading DNS Solution Provider
CVE-2025-68151

6.6MEDIUM

Key Information:

Vendor

Coredns

Status
Vendor
CVE Published:
8 January 2026

What is CVE-2025-68151?

CoreDNS, a DNS server featuring plugin chaining, is susceptible to a denial of service vulnerability found in multiple server implementations such as gRPC, HTTPS, and HTTP/3, prior to version 1.14.0. This vulnerability allows an unauthenticated remote attacker to exploit the absence of resource-limiting controls, leading to memory exhaustion and potential server crashes. Attackers can leverage this flaw by establishing numerous concurrent connections, sending oversized request bodies, or streaming excessive data. The issue is reminiscent of similar vulnerabilities, but it affects additional server types lacking enforced limits. A patch has been introduced in version 1.14.0 to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

coredns < 1.14.0

References

CVSS V4

Score:
6.6
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.