CVE-2025-68954

5.4 MEDIUM

📋 TL;DR

This vulnerability in Pterodactyl allows users who were actively connected via SFTP to retain file access even after their permissions are revoked. It affects administrators who manage game servers using Pterodactyl versions 1.11.11 and below. The issue occurs specifically when users are connected at the moment their permissions are changed.

💻 Affected Systems

Products:
  • Pterodactyl Panel
Versions: 1.11.11 and below
Operating Systems: All platforms running Pterodactyl
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SFTP connections active at the time of permission revocation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Former users maintain persistent unauthorized access to sensitive server files, potentially leading to data theft, modification, or deletion.

🟠

Likely Case

Users who lose permissions but remain connected can continue accessing files they shouldn't, violating access control policies.

🟢

If Mitigated

With proper monitoring and quick user management, impact is limited to brief unauthorized access windows.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires prior SFTP access and connection persistence during permission changes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.12.0

Vendor Advisory: https://github.com/pterodactyl/panel/security/advisories/GHSA-8c39-xppg-479c

Restart Required: Yes

Instructions:

1. Backup your Pterodactyl installation and database. 2. Update to version 1.12.0 using the official upgrade guide. 3. Restart the panel and queue worker services. 4. Verify all services are running correctly.

🔧 Temporary Workarounds

Manual SFTP Connection Termination

linux

Manually terminate all active SFTP sessions before or immediately after revoking user permissions.

# Restart SFTP service to drop all connections
sudo systemctl restart pterodactyl-sftp

🧯 If You Can't Patch

  • Monitor and audit all SFTP connections, terminating sessions when permissions change.
  • Implement network-level controls to restrict SFTP access to authorized users only.

🔍 How to Verify

Check if Vulnerable:

Check Pterodactyl version via admin panel or configuration files. Versions 1.11.11 and below are vulnerable.

Check Version:

php artisan p:info | grep 'Panel Version'

Verify Fix Applied:

After updating to 1.12.0, test by creating a user with SFTP access, connecting, revoking permissions, and verifying connection is terminated.

📡 Detection & Monitoring

Log Indicators:

  • SFTP connections persisting after user permission changes
  • Unauthorized file access attempts from previously authorized users

Network Indicators:

  • Unexpected SFTP traffic from users with revoked permissions

SIEM Query:

source="pterodactyl.log" AND ("SFTP" AND "permission" AND "revoke")

🔗 References

📤 Share & Export