CVE-2026-26016
Received Received - Intake
Authorization Bypass in Pterodactyl Wings Allows Data Exposure

Publication date: 2026-02-19

Last updated on: 2026-02-20

Assigner: GitHub, Inc.

Description
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.1, a missing authorization check in multiple controllers allows any user with access to a node secret token to fetch information about any server on a Pterodactyl instance, even if that server is associated with a different node. This issue stems from missing logic to verify that the node requesting server data is the same node that the server is associated with. Any authenticated Wings node can retrieve server installation scripts (potentially containing secret values) and manipulate the installation status of servers belonging to other nodes. Wings nodes may also manipulate the transfer status of servers belonging to other nodes. This vulnerability requires a user to acquire a secret access token for a node. Unless a user gains access to a Wings secret access token they would not be able to access any of these vulnerable endpoints, as every endpoint requires a valid node access token. A single compromised Wings node daemon token (stored in plaintext at `/etc/pterodactyl/config.yml`) grants access to sensitive configuration data of every server on the panel, rather than only to servers that the node has access to. An attacker can use this information to move laterally through the system, send excessive notifications, destroy server data on other nodes, and otherwise exfiltrate secrets that they should not have access to with only a node token. Additionally, triggering a false transfer success causes the panel to delete the server from the source node, resulting in permanent data loss. Users should upgrade to version 1.12.1 to receive a fix.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-20
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pterodactyl panel to 1.12.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-283 The product does not properly verify that a critical resource is owned by the proper entity.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Wings, the server control plane for Pterodactyl, a game server management panel. Before version 1.12.1, there was a missing authorization check in multiple controllers that allowed any user with access to a node secret token to retrieve information about any server on the Pterodactyl instance, even if the server belonged to a different node.

The issue arises because the system does not verify that the node requesting server data is the same node associated with that server. As a result, an authenticated Wings node with a secret token can access sensitive server installation scripts, manipulate installation and transfer statuses of servers on other nodes, and potentially cause permanent data loss.

To exploit this vulnerability, an attacker must obtain a Wings secret access token, which is stored in plaintext in the configuration file. Once compromised, this token grants access to sensitive configuration data for all servers on the panel, enabling lateral movement, data exfiltration, and destructive actions.

Upgrading to version 1.12.1 fixes this issue by adding the necessary authorization checks.


How can this vulnerability impact me? :

If exploited, this vulnerability can have severe impacts including unauthorized access to sensitive server configuration data across all nodes in the Pterodactyl instance.

  • Attackers can retrieve server installation scripts that may contain secret values.
  • They can manipulate the installation status of servers belonging to other nodes.
  • They can manipulate the transfer status of servers, potentially causing permanent data loss by triggering false transfer success events.
  • Attackers can move laterally through the system, send excessive notifications, destroy server data, and exfiltrate secrets.

Overall, the vulnerability can lead to data breaches, service disruption, and loss of critical server data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users should upgrade to Pterodactyl Wings version 1.12.1 or later, which contains the fix for the missing authorization checks.

Additionally, protect the Wings secret access token stored in plaintext at /etc/pterodactyl/config.yml, as compromise of this token allows unauthorized access to sensitive server data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart