Description
An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
Published: 2026-04-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is caused by insufficient input validation in PowerDNS’ internal web server, allowing an attacker to send a crafted request that triggers unlimited memory allocation. This can exhaust system memory and render the web server or associated process unresponsive, resulting in a denial of service. The weakness is a form of uncontrolled resource consumption and improper input validation, affecting the availability of the DNS service while leaving confidentiality and integrity unchanged.

Affected Systems

The affected products are PowerDNS Authoritative, PowerDNS DNSdist, and PowerDNS Recursor. No specific version information is provided, so all released kernels of these products are potentially impacted until a vendor patch is applied. The internal web server, which is disabled by default, must be enabled for this flaw to be exploitable.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS data is unavailable, so we cannot quantify exploitation likelihood. The description indicates an attacker can send a crafted HTTP request to the internal web server to trigger unlimited memory allocation. Authentication requirements are not explicitly stated, so we infer that the request may not need authentication, but this cannot be confirmed. The attack likely requires network access to the internal web server, which is typically restricted to administrators. Therefore, the overall risk remains moderate, affecting primarily availability when the internal web server is enabled.

Generated by OpenCVE AI on April 22, 2026 at 11:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest PowerDNS patch for the Authoritative server, DNSdist, and Recursor as documented in the vendor advisories.
  • Disable the internal web server if it is not required for your deployment to eliminate the attack surface.
  • Configure resource limits or memory quotas for the internal web server process to mitigate the impact of excessive memory allocation.

Generated by OpenCVE AI on April 22, 2026 at 11:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-789

Wed, 22 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Powerdns
Powerdns authoritative
Powerdns dnsdist
Powerdns recursor
Vendors & Products Powerdns
Powerdns authoritative
Powerdns dnsdist
Powerdns recursor

Wed, 22 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Description An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.
Title Insufficient input validation of internal webserver
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Powerdns Authoritative Dnsdist Recursor
cve-icon MITRE

Status: PUBLISHED

Assigner: OX

Published:

Updated: 2026-04-22T18:10:00.623Z

Reserved: 2026-03-18T10:06:16.573Z

Link: CVE-2026-33260

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-22T10:16:51.700

Modified: 2026-04-22T10:16:51.700

Link: CVE-2026-33260

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:00:05Z

Weaknesses