DNS Server Vulnerability in CoreDNS Affects Plugin Functionality
CVE-2026-33489
What is CVE-2026-33489?
CoreDNS, a versatile DNS server with plugin capabilities, features a vulnerability in its transfer plugin prior to version 1.14.3. The issue arises from how the server processes Access Control Lists (ACLs) when both a parent zone and a more-specific subzone are defined. Instead of employing a proper longest-suffix match, the longestMatch() function utilizes a lexicographic comparison, leading to the potential for a permissive parent-zone transfer rule to supersede a more restrictive subzone rule. As a result, unauthorized remote clients may exploit this weakness to execute AXFR or IXFR requests on affected subzones, exposing sensitive zone content based on the lexicographic order of zone names. The flaw has been rectified in version 1.14.3. For further details, refer to the security advisories and release notes.
Affected Version(s)
coredns < 1.14.3
