CVE-2026-26016: CWE-639: Authorization Bypass Through User-Controlled Key in pterodactyl panel
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings node can retrieve server installation scripts (potentially containing secret values) and manipulate the installation status of servers belonging to other nodes. Wings nodes may also manipulate the transfer status of servers belonging to other nodes. This vulnerability requires a user to acquire a secret access token for a node. Unless a user gains access to a Wings secret access token they would not be able to access any of these vulnerable endpoints, as every endpoint requires a valid node access token. A single compromised Wings node daemon token (stored in plaintext at `/etc/pterodactyl/config.yml`) grants access to sensitive configuration data of every server on the panel, rather than only to servers that the node has access to. An attacker can use this information to move laterally through the system, send excessive notifications, destroy server data on other nodes, and otherwise exfiltrate secrets that they should not have access to with only a node token. Additionally, triggering a false transfer success causes the panel to delete the server from the source node, resulting in permanent data loss. Users should upgrade to version 1.12.1 to receive a fix.
AI Analysis
Technical Summary
Pterodactyl is an open-source game server management panel, with Wings acting as its server control plane. Prior to version 1.12.1, a critical vulnerability (CVE-2026-26016) exists due to missing authorization checks in multiple Wings controllers. Specifically, the system fails to verify that the node requesting server information is the same node to which the server belongs. This flaw allows any authenticated Wings node possessing a node secret token to fetch information about any server on the panel, regardless of node association. The node secret token, stored in plaintext at /etc/pterodactyl/config.yml, acts as a bearer token granting access to sensitive server data and control functions. Exploiting this vulnerability, an attacker can retrieve server installation scripts containing secrets, manipulate installation and transfer statuses of servers on other nodes, and trigger false transfer success events that cause permanent deletion of server data on the source node. The vulnerability stems from CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-283 (Improper Authorization). Although exploitation requires possession of a node secret token, once obtained, the attacker gains broad access to all servers managed by the panel, enabling lateral movement, data exfiltration, and destructive operations. No public exploits are known in the wild yet. The vulnerability has a CVSS 4.0 score of 9.2 (critical), reflecting its high impact and network attack vector without user interaction or privileges. The recommended mitigation is to upgrade to Pterodactyl panel version 1.12.1, which implements proper authorization checks to ensure nodes can only access their own servers.
Potential Impact
This vulnerability poses a severe risk to organizations using Pterodactyl for game server management. If an attacker compromises a single Wings node secret token, they gain unauthorized access to all servers managed by the panel, regardless of node boundaries. This can lead to exposure of sensitive configuration data, including installation scripts that may contain secrets or credentials. Attackers can manipulate server installation and transfer statuses, potentially causing service disruptions or permanent data loss by triggering false transfer completions. The ability to move laterally across nodes increases the attack surface and complicates containment efforts. Organizations may face operational downtime, loss of critical game server data, and potential leakage of confidential information. The vulnerability undermines the integrity and availability of managed servers, impacting service reliability and user trust. Given the critical severity and ease of exploitation once a token is obtained, the threat is significant for any entity relying on Pterodactyl for server orchestration.
Mitigation Recommendations
1. Immediate upgrade to Pterodactyl panel version 1.12.1 or later to apply the official fix that enforces proper authorization checks between nodes and servers. 2. Secure storage of Wings node secret tokens: move tokens out of plaintext configuration files where possible, restrict file permissions strictly, and consider using environment variables or secret management tools. 3. Implement strict access controls and monitoring on nodes to prevent unauthorized access to the /etc/pterodactyl/config.yml file. 4. Regularly audit and rotate node secret tokens to limit exposure duration if compromised. 5. Employ network segmentation to isolate Wings nodes and limit lateral movement opportunities. 6. Monitor logs for unusual API requests or server transfer activities that could indicate exploitation attempts. 7. Educate administrators on the sensitivity of node tokens and enforce strong operational security practices. 8. Consider deploying intrusion detection systems to detect anomalous behavior related to server data access or transfer manipulations. 9. Backup server data regularly and verify backup integrity to recover from potential data loss caused by false transfer triggers.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, Brazil
CVE-2026-26016: CWE-639: Authorization Bypass Through User-Controlled Key in pterodactyl panel
Description
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings node can retrieve server installation scripts (potentially containing secret values) and manipulate the installation status of servers belonging to other nodes. Wings nodes may also manipulate the transfer status of servers belonging to other nodes. This vulnerability requires a user to acquire a secret access token for a node. Unless a user gains access to a Wings secret access token they would not be able to access any of these vulnerable endpoints, as every endpoint requires a valid node access token. A single compromised Wings node daemon token (stored in plaintext at `/etc/pterodactyl/config.yml`) grants access to sensitive configuration data of every server on the panel, rather than only to servers that the node has access to. An attacker can use this information to move laterally through the system, send excessive notifications, destroy server data on other nodes, and otherwise exfiltrate secrets that they should not have access to with only a node token. Additionally, triggering a false transfer success causes the panel to delete the server from the source node, resulting in permanent data loss. Users should upgrade to version 1.12.1 to receive a fix.
AI-Powered Analysis
Technical Analysis
Pterodactyl is an open-source game server management panel, with Wings acting as its server control plane. Prior to version 1.12.1, a critical vulnerability (CVE-2026-26016) exists due to missing authorization checks in multiple Wings controllers. Specifically, the system fails to verify that the node requesting server information is the same node to which the server belongs. This flaw allows any authenticated Wings node possessing a node secret token to fetch information about any server on the panel, regardless of node association. The node secret token, stored in plaintext at /etc/pterodactyl/config.yml, acts as a bearer token granting access to sensitive server data and control functions. Exploiting this vulnerability, an attacker can retrieve server installation scripts containing secrets, manipulate installation and transfer statuses of servers on other nodes, and trigger false transfer success events that cause permanent deletion of server data on the source node. The vulnerability stems from CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-283 (Improper Authorization). Although exploitation requires possession of a node secret token, once obtained, the attacker gains broad access to all servers managed by the panel, enabling lateral movement, data exfiltration, and destructive operations. No public exploits are known in the wild yet. The vulnerability has a CVSS 4.0 score of 9.2 (critical), reflecting its high impact and network attack vector without user interaction or privileges. The recommended mitigation is to upgrade to Pterodactyl panel version 1.12.1, which implements proper authorization checks to ensure nodes can only access their own servers.
Potential Impact
This vulnerability poses a severe risk to organizations using Pterodactyl for game server management. If an attacker compromises a single Wings node secret token, they gain unauthorized access to all servers managed by the panel, regardless of node boundaries. This can lead to exposure of sensitive configuration data, including installation scripts that may contain secrets or credentials. Attackers can manipulate server installation and transfer statuses, potentially causing service disruptions or permanent data loss by triggering false transfer completions. The ability to move laterally across nodes increases the attack surface and complicates containment efforts. Organizations may face operational downtime, loss of critical game server data, and potential leakage of confidential information. The vulnerability undermines the integrity and availability of managed servers, impacting service reliability and user trust. Given the critical severity and ease of exploitation once a token is obtained, the threat is significant for any entity relying on Pterodactyl for server orchestration.
Mitigation Recommendations
1. Immediate upgrade to Pterodactyl panel version 1.12.1 or later to apply the official fix that enforces proper authorization checks between nodes and servers. 2. Secure storage of Wings node secret tokens: move tokens out of plaintext configuration files where possible, restrict file permissions strictly, and consider using environment variables or secret management tools. 3. Implement strict access controls and monitoring on nodes to prevent unauthorized access to the /etc/pterodactyl/config.yml file. 4. Regularly audit and rotate node secret tokens to limit exposure duration if compromised. 5. Employ network segmentation to isolate Wings nodes and limit lateral movement opportunities. 6. Monitor logs for unusual API requests or server transfer activities that could indicate exploitation attempts. 7. Educate administrators on the sensitivity of node tokens and enforce strong operational security practices. 8. Consider deploying intrusion detection systems to detect anomalous behavior related to server data access or transfer manipulations. 9. Backup server data regularly and verify backup integrity to recover from potential data loss caused by false transfer triggers.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T21:36:29.554Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69973b6be884a8a4cb40973f
Added to database: 2/19/2026, 4:33:47 PM
Last enriched: 2/19/2026, 4:41:49 PM
Last updated: 2/20/2026, 4:04:04 AM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2821: SQL Injection in Fujian Smart Integrated Management Platform System
MediumCVE-2026-2384: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ays-pro Quiz Maker
MediumCVE-2026-27017: CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation in refraction-networking utls
LowCVE-2026-26996: CWE-1333: Inefficient Regular Expression Complexity in isaacs minimatch
HighCVE-2026-26995
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.