{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-33608","assignerOrgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","state":"PUBLISHED","assignerShortName":"OX","dateReserved":"2026-03-23T12:58:38.267Z","datePublished":"2026-04-22T14:00:15.473Z","dateUpdated":"2026-04-22T14:28:15.172Z"},"containers":{"cna":{"providerMetadata":{"orgId":"8ce71d90-2354-404b-a86e-bec2cc4e6981","shortName":"OX","dateUpdated":"2026-04-22T14:00:15.473Z"},"title":"Incomplete domain name sanitization during","datePublic":"2026-04-08T22:00:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Control of Generation of Code ('Code Injection')","type":"CWE"}]}],"affected":[{"vendor":"PowerDNS","product":"Authoritative","collectionURL":"https://repo.powerdns.com/","packageName":"pdns","repo":"https://github.com/PowerDNS/pdns","modules":["Bind backend"],"programFiles":["bindbackend2.cc"],"versions":[{"status":"affected","version":"5.0.0","lessThan":"5.0.4","versionType":"semver"},{"status":"affected","version":"4.9.0","lessThan":"4.9.14","versionType":"semver"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiring manual operation to fix it.</p>"}]}],"references":[{"url":"https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-powerdns-2026-05.html"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseSeverity":"HIGH","baseScore":7.4,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}}],"credits":[{"lang":"en","value":"Vitaly Simonovich","type":"finder"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-22T14:28:03.004705Z","id":"CVE-2026-33608","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-22T14:28:15.172Z"}}]}}