Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26016: CWE-639: Authorization Bypass Through User-Controlled Key in pterodactyl panel

0
Critical
VulnerabilityCVE-2026-26016cvecve-2026-26016cwe-639cwe-283
Published: Thu Feb 19 2026 (02/19/2026, 15:55:20 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: panel

Description

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings node can retrieve server installation scripts (potentially containing secret values) and manipulate the installation status of servers belonging to other nodes. Wings nodes may also manipulate the transfer status of servers belonging to other nodes. This vulnerability requires a user to acquire a secret access token for a node. Unless a user gains access to a Wings secret access token they would not be able to access any of these vulnerable endpoints, as every endpoint requires a valid node access token. A single compromised Wings node daemon token (stored in plaintext at `/etc/pterodactyl/config.yml`) grants access to sensitive configuration data of every server on the panel, rather than only to servers that the node has access to. An attacker can use this information to move laterally through the system, send excessive notifications, destroy server data on other nodes, and otherwise exfiltrate secrets that they should not have access to with only a node token. Additionally, triggering a false transfer success causes the panel to delete the server from the source node, resulting in permanent data loss. Users should upgrade to version 1.12.1 to receive a fix.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:46:02 UTC

Technical Analysis

Pterodactyl is an open-source game server management panel, with Wings acting as its server control plane. In versions prior to 1.12.1, a critical authorization bypass vulnerability (CVE-2026-26016) exists due to missing authorization checks in multiple Wings controllers. Specifically, the system fails to verify that the node requesting server information is the same node associated with that server. Consequently, any authenticated Wings node possessing a node secret token can access server data belonging to other nodes. This includes retrieving sensitive installation scripts that may contain secrets, manipulating server installation statuses, and altering server transfer statuses. The node secret token, stored in plaintext at /etc/pterodactyl/config.yml, acts as the authentication mechanism for Wings nodes. If an attacker compromises a single node token, they gain access to all server configurations on the panel, not just those tied to that node. This broad access allows lateral movement within the environment, excessive notification spamming, data destruction, and secret exfiltration. A particularly severe impact is the ability to trigger false transfer success events, causing the panel to delete servers from the source node and resulting in permanent data loss. The vulnerability is rated critical with a CVSS 4.0 score of 9.2, reflecting high impact on confidentiality, integrity, and availability, with no user interaction required but requiring possession of a secret token. No known exploits are currently reported in the wild. The fix is included in Pterodactyl panel version 1.12.1, which introduces proper authorization checks to ensure nodes can only access servers they are associated with.

Potential Impact

The impact of CVE-2026-26016 is severe for organizations using Pterodactyl panel to manage game servers or other services. An attacker who compromises a single Wings node secret token can access sensitive server configuration data across all nodes, leading to widespread confidentiality breaches. This can include exposure of secret installation scripts and credentials. Integrity is compromised as attackers can manipulate server installation and transfer statuses, potentially disrupting operations or causing permanent data loss by deleting servers during false transfer events. Availability is also at risk due to destructive actions and potential denial of service caused by data deletion or manipulation. The vulnerability facilitates lateral movement within the environment, increasing the attack surface and risk of further compromise. Organizations relying on Pterodactyl for multi-node server management face significant operational and reputational risks if exploited. The absence of user interaction requirements and the high severity score underscore the urgency of remediation. Although no exploits are known in the wild yet, the plaintext storage of node tokens and the critical nature of the flaw make it a high-value target for attackers.

Mitigation Recommendations

To mitigate CVE-2026-26016, organizations should immediately upgrade all Pterodactyl panel instances to version 1.12.1 or later, which contains the necessary authorization checks to restrict node access to their own servers. Additionally, organizations should: 1) Securely store node secret tokens by restricting file permissions on /etc/pterodactyl/config.yml to minimize risk of token theft. 2) Implement network segmentation and strict access controls to limit which hosts can communicate with Wings nodes, reducing token exposure. 3) Monitor logs for unusual Wings node activity, such as unexpected server data requests or transfer status changes, to detect potential exploitation attempts. 4) Rotate node secret tokens if compromise is suspected or after upgrading to invalidate previously leaked tokens. 5) Employ multi-factor authentication and strong operational security practices around node management to prevent unauthorized access. 6) Conduct regular audits of server and node configurations to ensure no unauthorized changes have occurred. 7) Educate administrators on the risks of token exposure and the importance of timely patching. These targeted steps go beyond generic advice by focusing on token protection, network controls, and monitoring specific to the Wings node environment.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T21:36:29.554Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69973b6be884a8a4cb40973f

Added to database: 2/19/2026, 4:33:47 PM

Last enriched: 2/28/2026, 2:46:02 PM

Last updated: 4/4/2026, 5:42:03 PM

Views: 129

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses