CVE-2026-26016

8.1 HIGH

📋 TL;DR

CVE-2026-26016 is an authorization bypass vulnerability in Pterodactyl Panel's Wings control plane that allows any authenticated Wings node to access and manipulate servers belonging to other nodes. This enables attackers with a compromised node token to retrieve sensitive server configuration data, trigger false transfers causing data loss, and move laterally through the system. All Pterodactyl instances running Wings versions before 1.12.1 are affected.

💻 Affected Systems

Products:
  • Pterodactyl Panel
  • Wings (Pterodactyl server control plane)
Versions: All versions prior to 1.12.1
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires access to a Wings node secret token, which is stored in plaintext at /etc/pterodactyl/config.yml by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all game servers managed by the panel, permanent data loss through false transfer triggers, lateral movement to other nodes, and exfiltration of all server secrets and configurations.

🟠

Likely Case

Unauthorized access to server installation scripts containing secrets, manipulation of server statuses, and potential data destruction on other nodes by an attacker with a single compromised node token.

🟢

If Mitigated

Limited impact if proper network segmentation and token protection are in place, but still allows unauthorized access to server data across nodes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires obtaining a valid node access token, but once obtained, the authorization bypass is straightforward to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.12.1

Vendor Advisory: https://github.com/pterodactyl/panel/security/advisories/GHSA-g7vw-f8p5-c728

Restart Required: Yes

Instructions:

1. Backup your Pterodactyl configuration and databases. 2. Update Pterodactyl Panel to version 1.12.1 using your preferred update method. 3. Update all Wings instances to version 1.12.1. 4. Restart all Wings services. 5. Verify the fix by checking version numbers.

🔧 Temporary Workarounds

Restrict Node Token Access

linux

Implement strict file permissions on node configuration files and monitor access to node tokens.

chmod 600 /etc/pterodactyl/config.yml
chown root:root /etc/pterodactyl/config.yml

Network Segmentation

all

Isolate Wings nodes from each other to limit lateral movement potential.

🧯 If You Can't Patch

  • Implement strict access controls on /etc/pterodactyl/config.yml files across all nodes
  • Monitor all API calls between Wings nodes and the panel for unauthorized cross-node access patterns

🔍 How to Verify

Check if Vulnerable:

Check Wings version with: wings --version. If version is below 1.12.1, the system is vulnerable.

Check Version:

wings --version

Verify Fix Applied:

Verify Wings version is 1.12.1 or higher with: wings --version. Test that nodes can only access their own assigned servers.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized API calls from nodes accessing servers not assigned to them
  • Multiple failed transfer status updates
  • Unexpected server deletion events

Network Indicators:

  • Unusual API traffic patterns between nodes and the panel
  • Cross-node server data requests

SIEM Query:

source="pterodactyl" AND (event="server_access" OR event="transfer_status") AND src_node!=assigned_node

🔗 References

📤 Share & Export