Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0396: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in PowerDNS DNSdist

0
Low
VulnerabilityCVE-2026-0396cvecve-2026-0396
Published: Tue Mar 31 2026 (03/31/2026, 11:50:51 UTC)
Source: CVE Database V5
Vendor/Project: PowerDNS
Product: DNSdist

Description

CVE-2026-0396 is a low-severity cross-site scripting (XSS) vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0. It allows an attacker to inject HTML content into the internal web dashboard by sending specially crafted DNS queries when domain-based dynamic rules are enabled via DynBlockRulesGroup:setSuffixMatchRule or setSuffixMatchRuleFFI. Exploitation requires no privileges but does require user interaction (dashboard access). The vulnerability does not impact confidentiality or availability but can cause limited integrity issues by injecting script-related HTML tags. No known exploits are currently reported in the wild. Organizations using affected DNSdist versions with dynamic domain rules enabled should apply mitigations to prevent potential dashboard manipulation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 12:23:56 UTC

Technical Analysis

CVE-2026-0396 is a vulnerability identified in PowerDNS DNSdist, a DNS load balancer and firewall product widely used in DNS infrastructure. The flaw arises from improper neutralization of script-related HTML tags in the internal web dashboard interface. Specifically, when domain-based dynamic rules are enabled using DynBlockRulesGroup:setSuffixMatchRule or setSuffixMatchRuleFFI, an attacker can send crafted DNS queries containing malicious HTML content. This content is then reflected unsanitized in the DNSdist web dashboard, leading to a basic cross-site scripting (XSS) vulnerability. The vulnerability allows injection of HTML/script tags that could execute in the context of the dashboard user’s browser. However, exploitation requires that the attacker can send DNS queries to the DNSdist instance and that a user with access to the dashboard views the injected content, thus requiring user interaction. The vulnerability does not compromise confidentiality or availability but can affect integrity by manipulating dashboard content or potentially executing scripts that alter dashboard behavior or steal session information. The CVSS v3.1 base score is 3.1, indicating low severity due to the need for user interaction and the limited impact scope. No known exploits have been reported in the wild, and no patches are explicitly linked in the provided data, though mitigation likely involves input sanitization and updating to fixed versions when available.

Potential Impact

The primary impact of CVE-2026-0396 is limited to the integrity of the DNSdist internal web dashboard. An attacker could use this XSS vulnerability to inject malicious HTML or scripts, potentially leading to session hijacking, dashboard manipulation, or misleading display of DNS query data. While confidentiality and availability are not directly affected, the integrity compromise could mislead administrators or enable further attacks if combined with other vulnerabilities. Organizations relying on DNSdist for DNS traffic management and security could face reduced trust in their monitoring tools or risk unauthorized dashboard actions. The requirement for user interaction and the internal nature of the dashboard limit the attack surface, but environments with exposed or widely accessed dashboards are at higher risk. The vulnerability could be leveraged in targeted attacks against DNS infrastructure operators, especially in environments where DNSdist is a critical component of DNS resolution and filtering.

Mitigation Recommendations

To mitigate CVE-2026-0396, organizations should: 1) Restrict access to the DNSdist web dashboard to trusted administrators only, ideally via network segmentation and VPNs. 2) Disable domain-based dynamic rules (DynBlockRulesGroup:setSuffixMatchRule and setSuffixMatchRuleFFI) if not strictly necessary, as these enable the injection vector. 3) Monitor DNS queries for suspicious patterns that could indicate attempts to inject malicious content. 4) Apply input validation and output encoding on the dashboard interface to neutralize script-related HTML tags, either by updating to patched versions once available or applying vendor-recommended fixes. 5) Educate administrators to avoid clicking on suspicious content within the dashboard and to log out when not actively using the interface. 6) Regularly audit DNSdist configurations and logs for anomalous activity. 7) Follow PowerDNS advisories for updates or patches addressing this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2025-11-28T09:18:05.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbb931e6bfc5ba1d10da44

Added to database: 3/31/2026, 12:08:17 PM

Last enriched: 3/31/2026, 12:23:56 PM

Last updated: 3/31/2026, 1:19:49 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses