Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26016: CWE-639: Authorization Bypass Through User-Controlled Key in pterodactyl panel

0
Critical
VulnerabilityCVE-2026-26016cvecve-2026-26016cwe-639cwe-283
Published: Thu Feb 19 2026 (02/19/2026, 15:55:20 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: panel

Description

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings node can retrieve server installation scripts (potentially containing secret values) and manipulate the installation status of servers belonging to other nodes. Wings nodes may also manipulate the transfer status of servers belonging to other nodes. This vulnerability requires a user to acquire a secret access token for a node. Unless a user gains access to a Wings secret access token they would not be able to access any of these vulnerable endpoints, as every endpoint requires a valid node access token. A single compromised Wings node daemon token (stored in plaintext at `/etc/pterodactyl/config.yml`) grants access to sensitive configuration data of every server on the panel, rather than only to servers that the node has access to. An attacker can use this information to move laterally through the system, send excessive notifications, destroy server data on other nodes, and otherwise exfiltrate secrets that they should not have access to with only a node token. Additionally, triggering a false transfer success causes the panel to delete the server from the source node, resulting in permanent data loss. Users should upgrade to version 1.12.1 to receive a fix.

AI-Powered Analysis

AILast updated: 02/19/2026, 16:41:49 UTC

Technical Analysis

Pterodactyl is an open-source game server management panel, with Wings acting as its server control plane. Prior to version 1.12.1, a critical vulnerability (CVE-2026-26016) exists due to missing authorization checks in multiple Wings controllers. Specifically, the system fails to verify that the node requesting server information is the same node to which the server belongs. This flaw allows any authenticated Wings node possessing a node secret token to fetch information about any server on the panel, regardless of node association. The node secret token, stored in plaintext at /etc/pterodactyl/config.yml, acts as a bearer token granting access to sensitive server data and control functions. Exploiting this vulnerability, an attacker can retrieve server installation scripts containing secrets, manipulate installation and transfer statuses of servers on other nodes, and trigger false transfer success events that cause permanent deletion of server data on the source node. The vulnerability stems from CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-283 (Improper Authorization). Although exploitation requires possession of a node secret token, once obtained, the attacker gains broad access to all servers managed by the panel, enabling lateral movement, data exfiltration, and destructive operations. No public exploits are known in the wild yet. The vulnerability has a CVSS 4.0 score of 9.2 (critical), reflecting its high impact and network attack vector without user interaction or privileges. The recommended mitigation is to upgrade to Pterodactyl panel version 1.12.1, which implements proper authorization checks to ensure nodes can only access their own servers.

Potential Impact

This vulnerability poses a severe risk to organizations using Pterodactyl for game server management. If an attacker compromises a single Wings node secret token, they gain unauthorized access to all servers managed by the panel, regardless of node boundaries. This can lead to exposure of sensitive configuration data, including installation scripts that may contain secrets or credentials. Attackers can manipulate server installation and transfer statuses, potentially causing service disruptions or permanent data loss by triggering false transfer completions. The ability to move laterally across nodes increases the attack surface and complicates containment efforts. Organizations may face operational downtime, loss of critical game server data, and potential leakage of confidential information. The vulnerability undermines the integrity and availability of managed servers, impacting service reliability and user trust. Given the critical severity and ease of exploitation once a token is obtained, the threat is significant for any entity relying on Pterodactyl for server orchestration.

Mitigation Recommendations

1. Immediate upgrade to Pterodactyl panel version 1.12.1 or later to apply the official fix that enforces proper authorization checks between nodes and servers. 2. Secure storage of Wings node secret tokens: move tokens out of plaintext configuration files where possible, restrict file permissions strictly, and consider using environment variables or secret management tools. 3. Implement strict access controls and monitoring on nodes to prevent unauthorized access to the /etc/pterodactyl/config.yml file. 4. Regularly audit and rotate node secret tokens to limit exposure duration if compromised. 5. Employ network segmentation to isolate Wings nodes and limit lateral movement opportunities. 6. Monitor logs for unusual API requests or server transfer activities that could indicate exploitation attempts. 7. Educate administrators on the sensitivity of node tokens and enforce strong operational security practices. 8. Consider deploying intrusion detection systems to detect anomalous behavior related to server data access or transfer manipulations. 9. Backup server data regularly and verify backup integrity to recover from potential data loss caused by false transfer triggers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T21:36:29.554Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69973b6be884a8a4cb40973f

Added to database: 2/19/2026, 4:33:47 PM

Last enriched: 2/19/2026, 4:41:49 PM

Last updated: 2/20/2026, 4:04:04 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats