Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0397: Overly Permissive Cross-domain Whitelist in PowerDNS DNSdist

0
Low
VulnerabilityCVE-2026-0397cvecve-2026-0397
Published: Tue Mar 31 2026 (03/31/2026, 11:53:13 UTC)
Source: CVE Database V5
Vendor/Project: PowerDNS
Product: DNSdist

Description

CVE-2026-0397 is a vulnerability in PowerDNS DNSdist versions 1. 9. 0 and 2. 0. 0 where an overly permissive Cross-Origin Resource Sharing (CORS) policy in the internal webserver can allow an attacker to trick an administrator into visiting a malicious website. This can lead to unauthorized disclosure of configuration information from the DNSdist dashboard. The internal webserver is disabled by default, reducing exposure. Exploitation requires user interaction and does not allow modification or disruption of service. The CVSS score is low (3. 1), reflecting limited impact and higher attack complexity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 12:23:39 UTC

Technical Analysis

CVE-2026-0397 is a security vulnerability identified in PowerDNS DNSdist versions 1.9.0 and 2.0.0 related to the internal webserver component. When this internal webserver is enabled—a setting disabled by default—the Cross-Origin Resource Sharing (CORS) policy is misconfigured, allowing an overly permissive cross-domain whitelist. This misconfiguration enables an attacker to craft a malicious website that, when visited by an administrator logged into the DNSdist dashboard, can extract sensitive information about the running configuration. The vulnerability does not permit modification of data or disruption of service but compromises confidentiality by leaking configuration details. Exploitation requires no privileges but does require user interaction (the administrator must visit the malicious site). The CVSS 3.1 base score is 3.1, indicating a low severity due to the limited impact and attack complexity. No known exploits are currently in the wild. The root cause is a failure to properly restrict CORS origins, which is critical in web applications to prevent unauthorized cross-origin requests. Since the internal webserver is disabled by default, exposure is limited to environments where administrators have explicitly enabled it. This vulnerability highlights the importance of secure default configurations and careful CORS policy management in administrative interfaces.

Potential Impact

The primary impact of CVE-2026-0397 is the potential unauthorized disclosure of sensitive configuration information from the DNSdist dashboard. Such information could include network topology, DNS routing rules, or other operational details that could aid attackers in further reconnaissance or targeted attacks. Although the vulnerability does not allow modification of data or denial of service, the leakage of configuration data can weaken an organization's security posture. The requirement for user interaction (administrator visiting a malicious site) limits the scope of exploitation but does not eliminate risk, especially in environments where administrators may be targeted via phishing or social engineering. Organizations relying on DNSdist for DNS load balancing or security may face increased risk of information leakage if the internal webserver is enabled with default or weak CORS settings. The impact is thus primarily on confidentiality, with no direct effect on integrity or availability.

Mitigation Recommendations

To mitigate CVE-2026-0397, organizations should first verify whether the internal webserver in DNSdist is enabled; if not required, it should remain disabled to eliminate exposure. If the internal webserver is necessary, administrators must review and tighten the CORS policy to restrict allowed origins strictly to trusted domains, avoiding wildcard or overly broad allowances. Implement Content Security Policy (CSP) headers to reduce the risk of malicious script execution. Educate administrators about phishing and social engineering risks to prevent them from visiting untrusted or malicious websites while logged into the dashboard. Regularly update DNSdist to the latest versions where this vulnerability is addressed or patched. Network segmentation and access controls should limit dashboard access to trusted networks and users. Monitoring and logging access to the dashboard can help detect suspicious activity. Finally, consider deploying web application firewalls (WAFs) that can detect and block cross-origin attacks targeting the dashboard interface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
OX
Date Reserved
2025-11-28T09:18:06.484Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbb931e6bfc5ba1d10da47

Added to database: 3/31/2026, 12:08:17 PM

Last enriched: 3/31/2026, 12:23:39 PM

Last updated: 3/31/2026, 1:19:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses