Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-49132 PoC — Pterodactyl Panel Allows Unauthenticated Arbitrary Remote Code Execution

Source
Associated Vulnerability
Title:Pterodactyl Panel Allows Unauthenticated Arbitrary Remote Code Execution (CVE-2025-49132)
Description:Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.
Description
A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132
Readme
# CVE-2025-49132
Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.
---
## How does it work
The attacker sends a GET request to `/locales/locale.json`, if the response returns you a JSON and the URL doesn't contain the parameter `hash=` then it's vulnerable to CVE-2025-49132.

To exploit the vulnerability you have to use the parameters `locale=` and `namespace=` at the same time to read __ONLY PHP FILES__ and you will get a JSON response with the variables stored in the PHP file you selected.

For example: `/locales/locale.json?locale=../../../pterodactyl&namespace=config/database`

To get more interesting PHP files to read you can check the official Pterodactyl repository ^^

## How to use the script
Get the database credentials with the command: `python3 CVE-2025-49132_PoC.py.py <url>`
## How to get access to a Pterodactyl panel as administrator with CVE-2025-49132
1. Get the database credentials
2. Find a way to establish a connection with their database using the credentials you have found (por 3306 open, local phpmyadmin, or directly phpmyadmin.co)
3. If you managed to get access to the database, congrats! you only have to create yourself a Pterodactyl account in the `users` table
4. Coonect to the panel with the user you created
5. Now you are connected to the panel as administrator and have access to everything :)

At this point you should have basic pentesting knowledge to know how to get a reverse shell
File Snapshot

[4.0K] /data/pocs/976c049fa1fcb96ee2401246dca8d7e25f352cdd ├── [2.1K] CVE-2025-49132_PoC.py └── [2.0K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →