CVE-2021-41129
PHP vulnerability analysis and mitigation

Overview

Pterodactyl, an open-source game server management panel built with PHP 7, React, and Go, was affected by CVE-2021-41129. The vulnerability was discovered and disclosed on October 6, 2021. The issue allowed a malicious user to bypass authentication during the two-factor authentication process by manipulating the confirmation_token parameter, potentially allowing authentication as another user in the Panel (GitHub Advisory).

Technical details

The vulnerability existed in the LoginCheckpointController@__invoke method which handles two-factor authentication. The flaw allowed attackers to modify a confirmation_token parameter, which was expected to be a 64-character random alphanumeric string referencing a cached user_id value. Due to improper validation, any cache element containing only digits could be referenced, potentially allowing access to arbitrary user accounts. The vulnerability received a CVSS v3.1 score of 8.1 (HIGH) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (GitHub Advisory).

Impact

While classified as a high-risk login bypass vulnerability, successful exploitation required specific conditions: the targeted account must have two-factor authentication enabled, the attacker needed to provide a valid 2FA token, and the referenced cache key had to remain valid throughout the attack. If successfully exploited, an attacker could authenticate as another user without knowing their email or password (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 1.6.2. The fix involved changing the authentication logic to use an encrypted session store instead of user-controlled values. Additionally, the codebase was audited to ensure similar vulnerabilities were not present elsewhere. Users were advised to upgrade to version 1.6.2 (Panel Release).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23492HIGH8.8
  • PHPPHP
  • pimcore/pimcore
NoYesJan 14, 2026
CVE-2026-23498HIGH7.2
  • PHPPHP
  • shopware/core
NoYesJan 14, 2026
GHSA-595p-g7xc-c333MEDIUM6.9
  • PHPPHP
  • algolia/algoliasearch-magento-2
NoYesJan 14, 2026
CVE-2022-50807MEDIUM6.9
  • PHPPHP
  • concrete5/concrete5
NoNoJan 13, 2026
CVE-2026-0859MEDIUM5.2
  • PHPPHP
  • typo3/cms-core
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management