๐Ÿ” CVE Alert

CVE-2026-32936

UNKNOWN 0.0

CoreDNS DoH GET path missing size validation causes CPU and memory amplification

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

CoreDNS is a DNS server that chains plugins. In versions prior to 1.14.3, the DNS-over-HTTPS (DoH) GET path accepts oversized dns= query parameter values and performs URL query parsing, base64 decoding, and DNS message unpacking before rejecting the request. Unlike the POST path, which applies a bounded read via http.MaxBytesReader limited to 65536 bytes, the GET path has no equivalent size validation before expensive processing. A remote, unauthenticated attacker can repeatedly send oversized DoH GET requests to force high CPU usage, large transient memory allocations, and elevated garbage-collection pressure, leading to denial of service. This issue has been fixed in version 1.14.3.

CWE CWE-400
Vendor coredns
Product coredns
Published May 5, 2026
Last Updated May 5, 2026
Stay Ahead of the Next One

Get instant alerts for coredns coredns

Be the first to know when new unknown vulnerabilities affecting coredns coredns are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

coredns / coredns
< 1.14.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/coredns/coredns/security/advisories/GHSA-63cw-r7xf-jmwr github.com: https://github.com/coredns/coredns/releases/tag/v1.14.3