Home

Description

CoreDNS is a DNS server that chains plugins. Prior to version 1.14.0, multiple CoreDNS server implementations (gRPC, HTTPS, and HTTP/3) lack critical resource-limiting controls. An unauthenticated remote attacker can exhaust memory and degrade or crash the server by opening many concurrent connections, streams, or sending oversized request bodies. The issue is similar in nature to CVE-2025-47950 (QUIC DoS) but affects additional server types that do not enforce connection limits, stream limits, or message size constraints. Version 1.14.0 contains a patch.

PUBLISHED Reserved 2025-12-15 | Published 2026-01-08 | Updated 2026-01-08 | Assigner GitHub_M




MEDIUM: 6.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< 1.14.0
affected

References

github.com/...oredns/security/advisories/GHSA-527x-5wrf-22m2

github.com/coredns/coredns/pull/7490

github.com/...ommit/0d8cbb1a6bcb6bc9c1a489865278b8725fa20812

cve.org (CVE-2025-68151)

nvd.nist.gov (CVE-2025-68151)

Download JSON