CVE-2025-49132

high-risk
Published 2025-06-20

Pterodactyl is a free, open-source game server management panel. Prior to version 1.11.11, using the /locales/locale.json with the locale and namespace query parameters, a malicious actor is able to execute arbitrary code without being authenticated. With the ability to execute arbitrary code it could be used to gain access to the Panel's server, read credentials from the Panel's config, extract sensitive information from the database, access files of servers managed by the panel, etc. This issue has been patched in version 1.11.11. There are no software workarounds for this vulnerability, but use of an external Web Application Firewall (WAF) could help mitigate this attack.

Do I need to act?

!
12.4% chance of exploitation in next 30 days
EPSS score — higher than 88% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
+
Fix available
Upgrade to: 24c82b0e335fb5d7a844226b08abf9f176e592f0, ac16af6d0a704c009240f18cfe3b31ca1dc24923
10
CVSS 10.0/10 Critical
NETWORK / LOW complexity
50
/ 100
high-risk
Severity 33/34 · Critical
Exploitability 12/34 · Low
Exposure 5/34 · Minimal