Skip to main content

CVE-2025-49132: CWE-94: Improper Control of Generation of Code ('Code Injection') in pterodactyl panel

Critical
VulnerabilityCVE-2025-49132cvecve-2025-49132cwe-94
Published: Fri Jun 20 2025 (06/20/2025, 16:56:41 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: panel

Description

Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.

AI-Powered Analysis

AILast updated: 06/21/2025, 11:06:22 UTC

Technical Analysis

CVE-2025-49132 is a critical remote code execution vulnerability affecting the Pterodactyl game server management panel, versions prior to 1.11.11. Pterodactyl is an open-source platform widely used to manage game servers. The vulnerability arises from improper control over code generation (CWE-94) via the /locales/locale.json endpoint, which accepts locale and namespace query parameters. An unauthenticated attacker can exploit this flaw to execute arbitrary code on the server hosting the panel. This capability allows the attacker to gain full control over the panel's server environment, including reading sensitive configuration files containing credentials, extracting confidential data from the database, and accessing files related to the managed game servers. The vulnerability has a CVSS v3.1 base score of 10.0, indicating critical severity, with attack vector being network-based, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability all rated high. No software workarounds exist; however, deployment of an external Web Application Firewall (WAF) may provide some mitigation. The issue was patched in version 1.11.11 of the panel, and users are strongly advised to upgrade immediately to remediate the risk. Currently, there are no known exploits in the wild, but the ease of exploitation and critical impact make this vulnerability a high priority for patching and defense.

Potential Impact

For European organizations using Pterodactyl panel to manage game servers, this vulnerability poses a severe risk. Successful exploitation can lead to complete compromise of the panel server, resulting in unauthorized access to sensitive credentials and data, disruption or takeover of game servers, and potential lateral movement within the organization's network. This can cause significant operational downtime, data breaches, and reputational damage. Given the critical nature of the vulnerability and the lack of authentication or user interaction requirements, attackers can remotely exploit this flaw at scale. Organizations in the gaming industry, hosting providers, and any enterprises relying on Pterodactyl for server management are at heightened risk. The impact extends beyond confidentiality to integrity and availability, potentially enabling attackers to alter or destroy data and disrupt services. The absence of known exploits in the wild currently provides a window for proactive remediation, but the vulnerability’s characteristics suggest it could be rapidly weaponized.

Mitigation Recommendations

1. Immediate upgrade of all Pterodactyl panel instances to version 1.11.11 or later is the most effective mitigation. 2. Deploy an external Web Application Firewall (WAF) configured to monitor and block suspicious requests targeting the /locales/locale.json endpoint, especially those with unusual locale or namespace parameters. 3. Restrict network access to the panel server by implementing IP whitelisting or VPN access controls to limit exposure to trusted users only. 4. Conduct thorough audits of server logs and configurations to detect any signs of exploitation attempts or unauthorized access. 5. Implement strict file system permissions and isolate the panel server environment to minimize potential damage from a successful exploit. 6. Regularly back up panel configurations and managed server data to enable rapid recovery in case of compromise. 7. Monitor threat intelligence feeds for emerging exploit code or attack campaigns targeting this vulnerability to adjust defenses accordingly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-02T10:39:41.633Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68568e82aded773421b5a8c7

Added to database: 6/21/2025, 10:50:42 AM

Last enriched: 6/21/2025, 11:06:22 AM

Last updated: 8/4/2025, 12:55:10 AM

Views: 27

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats