CVE-2026-0397: Overly Permissive Cross-domain Whitelist in PowerDNS DNSdist
CVE-2026-0397 is a vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0 where an overly permissive Cross-Origin Resource Sharing (CORS) policy in the internal webserver can allow an attacker to trick an administrator into visiting a malicious website. This can lead to unauthorized disclosure of configuration information from the DNSdist dashboard. The internal webserver is disabled by default, reducing exposure. Exploitation requires user interaction and does not allow modification or disruption of service. The CVSS score is low (3. 1), reflecting limited impact and higher attack complexity.
AI Analysis
Technical Summary
CVE-2026-0397 is a security vulnerability identified in PowerDNS DNSdist versions 1.9.0 and 2.0.0 related to the internal webserver component. When this internal webserver is enabled—a setting disabled by default—the Cross-Origin Resource Sharing (CORS) policy is misconfigured, allowing an overly permissive cross-domain whitelist. This misconfiguration enables an attacker to craft a malicious website that, when visited by an administrator logged into the DNSdist dashboard, can extract sensitive information about the running configuration. The vulnerability does not permit modification of data or disruption of service but compromises confidentiality by leaking configuration details. Exploitation requires no privileges but does require user interaction (the administrator must visit the malicious site). The CVSS 3.1 base score is 3.1, indicating a low severity due to the limited impact and attack complexity. No known exploits are currently in the wild. The root cause is a failure to properly restrict CORS origins, which is critical in web applications to prevent unauthorized cross-origin requests. Since the internal webserver is disabled by default, exposure is limited to environments where administrators have explicitly enabled it. This vulnerability highlights the importance of secure default configurations and careful CORS policy management in administrative interfaces.
Potential Impact
The primary impact of CVE-2026-0397 is the potential unauthorized disclosure of sensitive configuration information from the DNSdist dashboard. Such information could include network topology, DNS routing rules, or other operational details that could aid attackers in further reconnaissance or targeted attacks. Although the vulnerability does not allow modification of data or denial of service, the leakage of configuration data can weaken an organization's security posture. The requirement for user interaction (administrator visiting a malicious site) limits the scope of exploitation but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. Organizations relying on DNSdist for DNS load balancing or security may face increased risk of information leakage if the internal webserver is enabled with default or weak CORS settings. The impact is thus primarily on confidentiality, with no direct effect on integrity or availability.
Mitigation Recommendations
To mitigate CVE-2026-0397, organizations should first verify whether the internal webserver in DNSdist is enabled; if not required, it should remain disabled to eliminate exposure. If the internal webserver is necessary, administrators must review and tighten the CORS policy to restrict allowed origins strictly to trusted domains, avoiding wildcard or overly broad allowances. Implement Content Security Policy (CSP) headers to reduce the risk of malicious script execution. Educate administrators about phishing and social engineering risks to prevent them from visiting untrusted or malicious websites while logged into the dashboard. Regularly update DNSdist to the latest versions where this vulnerability is addressed or patched. Network segmentation and access controls should limit dashboard access to trusted networks and users. Monitoring and logging access to the dashboard can help detect suspicious activity. Finally, consider deploying web application firewalls (WAFs) that can detect and block cross-origin attacks targeting the dashboard interface.
Affected Countries
United States, Germany, Netherlands, United Kingdom, France, Japan, South Korea, Australia, Canada, Sweden
CVE-2026-0397: Overly Permissive Cross-domain Whitelist in PowerDNS DNSdist
Description
CVE-2026-0397 is a vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0 where an overly permissive Cross-Origin Resource Sharing (CORS) policy in the internal webserver can allow an attacker to trick an administrator into visiting a malicious website. This can lead to unauthorized disclosure of configuration information from the DNSdist dashboard. The internal webserver is disabled by default, reducing exposure. Exploitation requires user interaction and does not allow modification or disruption of service. The CVSS score is low (3. 1), reflecting limited impact and higher attack complexity.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0397 is a security vulnerability identified in PowerDNS DNSdist versions 1.9.0 and 2.0.0 related to the internal webserver component. When this internal webserver is enabled—a setting disabled by default—the Cross-Origin Resource Sharing (CORS) policy is misconfigured, allowing an overly permissive cross-domain whitelist. This misconfiguration enables an attacker to craft a malicious website that, when visited by an administrator logged into the DNSdist dashboard, can extract sensitive information about the running configuration. The vulnerability does not permit modification of data or disruption of service but compromises confidentiality by leaking configuration details. Exploitation requires no privileges but does require user interaction (the administrator must visit the malicious site). The CVSS 3.1 base score is 3.1, indicating a low severity due to the limited impact and attack complexity. No known exploits are currently in the wild. The root cause is a failure to properly restrict CORS origins, which is critical in web applications to prevent unauthorized cross-origin requests. Since the internal webserver is disabled by default, exposure is limited to environments where administrators have explicitly enabled it. This vulnerability highlights the importance of secure default configurations and careful CORS policy management in administrative interfaces.
Potential Impact
The primary impact of CVE-2026-0397 is the potential unauthorized disclosure of sensitive configuration information from the DNSdist dashboard. Such information could include network topology, DNS routing rules, or other operational details that could aid attackers in further reconnaissance or targeted attacks. Although the vulnerability does not allow modification of data or denial of service, the leakage of configuration data can weaken an organization's security posture. The requirement for user interaction (administrator visiting a malicious site) limits the scope of exploitation but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. Organizations relying on DNSdist for DNS load balancing or security may face increased risk of information leakage if the internal webserver is enabled with default or weak CORS settings. The impact is thus primarily on confidentiality, with no direct effect on integrity or availability.
Mitigation Recommendations
To mitigate CVE-2026-0397, organizations should first verify whether the internal webserver in DNSdist is enabled; if not required, it should remain disabled to eliminate exposure. If the internal webserver is necessary, administrators must review and tighten the CORS policy to restrict allowed origins strictly to trusted domains, avoiding wildcard or overly broad allowances. Implement Content Security Policy (CSP) headers to reduce the risk of malicious script execution. Educate administrators about phishing and social engineering risks to prevent them from visiting untrusted or malicious websites while logged into the dashboard. Regularly update DNSdist to the latest versions where this vulnerability is addressed or patched. Network segmentation and access controls should limit dashboard access to trusted networks and users. Monitoring and logging access to the dashboard can help detect suspicious activity. Finally, consider deploying web application firewalls (WAFs) that can detect and block cross-origin attacks targeting the dashboard interface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- OX
- Date Reserved
- 2025-11-28T09:18:06.484Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cbb931e6bfc5ba1d10da47
Added to database: 3/31/2026, 12:08:17 PM
Last enriched: 3/31/2026, 12:23:39 PM
Last updated: 3/31/2026, 1:19:49 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.