Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49132— Pterodactyl Panel Allows Unauthenticated Arbitrary Remote Code Execution

CVSS 10.0 · Critical EPSS 15.66% · P95
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-49132

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Pterodactyl Panel Allows Unauthenticated Arbitrary Remote Code Execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Pterodactyl Panel 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Pterodactyl Panel是Pterodactyl开源的一个免费的开源游戏服务器管理面板。 Pterodactyl Panel 1.11.11之前版本存在代码注入漏洞,该漏洞源于/locales/locale.json端点未验证locale和namespace参数,可能导致任意代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
pterodactylpanel < 1.11.11 -

II. Public POCs for CVE-2025-49132

#POC DescriptionSource LinkShenlong Link
1Pterodactyl is a free, open-source game server management panel. Using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49132.yamlPOC Details
2A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132https://github.com/Zen-kun04/CVE-2025-49132POC Details
3Check a list of Pterodactyl panels for vulnerabilities from a file.https://github.com/nfoltc/CVE-2025-49132POC Details
4Pterodactyl翼龙面板CVE-2025-49132批量检测☝️🤓https://github.com/qiaojojo/CVE-2025-49132_pocPOC Details
5PoCs for CVE-2025-49132https://github.com/63square/CVE-2025-49132POC Details
6Poc - CVE-2025-49132https://github.com/melonlonmeo/CVE-2025-49132POC Details
7Check a list of Pterodactyl panels for vulnerabilities from a file.https://github.com/uxieltc/CVE-2025-49132POC Details
8Nonehttps://github.com/0xtensho/CVE-2025-49132-pocPOC Details
9This is an improved version of the CVE-2025-49132 proof of concept exploit.https://github.com/GRodolphe/CVE-2025-49132_pocPOC Details
10Check a list of Pterodactyl panels for vulnerabilities from a file.https://github.com/pxxdrobits/CVE-2025-49132POC Details
11CVE-2025-49132https://github.com/WebSafety-2tina/CVE-2025-49132POC Details
12Nonehttps://github.com/typicalsmc/CVE-2025-49132-PoCPOC Details
13CVE-2025-49132 is a critical arbitrary code execution vulnerability affecting the Pterodactyl game server management panel. This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected systems, potentially leading to full system compromisehttps://github.com/f3d0rq/CVE-2025-49132POC Details
14CVE-2025-49132 is a critical arbitrary code execution vulnerability affecting the Pterodactyl game server management panel. This vulnerability allows unauthenticated remote attackers to execute arbitrary code on affected systems, potentially leading to full system compromisehttps://github.com/0xf3d0rq/CVE-2025-49132POC Details
15This repository contains a Proof of Concept (PoC) for CVE-2025-49132, a critical vulnerability in Pterodactyl Panel versions < 1.11.11.https://github.com/str1keboo/CVE-2025-49132POC Details
16Nonehttps://github.com/malw0re/CVE-2025-49132-ModsPOC Details
17Exploit for Pterodactyl Panel ≤ 1.11.10 - unauthenticated LFI to RCE.https://github.com/YoyoChaud/CVE-2025-49132POC Details
18Nonehttps://github.com/ramzihafiz/CVE-2025-49132POC Details
19Nonehttps://github.com/kerburenthusiasm/CVE-2025-49132-PoCPOC Details
20CVE-2025-49132: Pterodactyl Panel UnauthN LFI to RCE (w/ pearcmd) in posix shhttps://github.com/matesz44/CVE-2025-49132POC Details
21Nonehttps://github.com/Ahmedf000/CVE-2025-49132_HTB_SEASON10POC Details
22This script exploits Remote Code Execution vulnerability in Pterodactyl Panel < 1.11.11https://github.com/Pwndalf/CVE-2025-49132-PoCPOC Details
23PoC exploit for CVE-2025-49132 (GHSA-24wv-6c99-f843) – Unauthenticated Remote Code Execution in Pterodactyl Panel ≤ 1.11.10https://github.com/dollarboysushil/CVE-2025-49132-Pterodactyl-Panel-Unauthenticated-Remote-Code-Execution-RCE-POC Details
24Exploit CVE-2025-49132 Pterodactyl Panel RCEhttps://github.com/thealchimist86/CVE-2025-49132-Pterodactyl-Panel-RCEPOC Details
25Nonehttps://github.com/scroollocker/CVE-2025-49132POC Details
26CVE-2025-49132https://github.com/rippsec/CVE-2025-49132POC Details
27 CVE For Pterodactyl (For Study and Education)https://github.com/popyue/CVE-2025-49132POC Details
28The flaw allows an attacker to execute arbitrary system commands on the server hosting the Pterodactyl Panel without any prior authentication.https://github.com/4nuxd/CVE-2025-49132POC Details
29CVE-2025-49132https://github.com/rippxsec/CVE-2025-49132POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-49132

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-49132

No comments yet


Leave a comment