exploitdb
SCANNER
by Zen-kun04 · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52341
This script checks for CVE-2025-49132 in Pterodactyl Panel by exploiting a path traversal vulnerability to leak database credentials. It does not execute arbitrary code but confirms vulnerability by retrieving sensitive configuration data.
Classification
Scanner 90%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
Network access to the target · Target running vulnerable Pterodactyl Panel version
nomisec
WORKING POC
18 stars
by YoyoChaud · remote
https://github.com/YoyoChaud/CVE-2025-49132
This repository contains a functional exploit for CVE-2025-49132, targeting Pterodactyl Panel ≤ 1.11.10. The exploit leverages an unauthenticated LFI vulnerability in the `/locales/locale.json` endpoint to achieve RCE via multiple methods, including `pearcmd.php` inclusion, PHP filter chains, and Laravel deserialization.
Classification
Working Poc 95%
Target:
Pterodactyl Panel ≤ 1.11.10
No auth needed
Prerequisites:
Target running Pterodactyl Panel ≤ 1.11.10 · Network access to the target · Python environment with `requests` library
nomisec
WORKING POC
16 stars
by Zen-kun04 · infoleak
https://github.com/Zen-kun04/CVE-2025-49132
The PoC exploits a path traversal vulnerability in Pterodactyl's locale endpoint to read arbitrary PHP files, specifically targeting database credentials. It sends a crafted GET request to leak sensitive configuration data, demonstrating the vulnerability's impact.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel
nomisec
WORKING POC
12 stars
by malw0re · poc
https://github.com/malw0re/CVE-2025-49132-Mods
This repository contains a functional Python exploit for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel. The exploit leverages LFI in the /locales/locale.json endpoint to interact with pearcmd.php, enabling arbitrary file creation and command execution.
Classification
Working Poc 95%
Target:
Pterodactyl Panel (prior to v1.11.11)
No auth needed
Prerequisites:
Target running vulnerable Pterodactyl Panel · Network access to the target
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2025/CVE-2025-49132
This repository contains a functional SQL injection exploit for WordPress Quiz Maker (CVE-2025-10042), demonstrating time-based blind SQLi via crafted HTTP headers. The exploit includes data extraction capabilities for admin credentials and password hashes.
Classification
Working Poc 95%
Target:
WordPress Quiz Maker <= 6.7.0.56
No auth needed
Prerequisites:
target WordPress URL · path to quiz page · vulnerable header (default: X-Forwarded-For)
nomisec
WORKING POC
5 stars
by 63square · remote
https://github.com/63square/CVE-2025-49132
This repository contains functional exploit code for CVE-2025-49132, a directory traversal vulnerability in Pterodactyl Panel versions 1.9.0 to 1.11.10. The exploit allows unauthenticated remote code execution by manipulating the `locale` and `namespace` parameters to read arbitrary files and write malicious PHP payloads.
Classification
Working Poc 95%
Target:
Pterodactyl Panel 1.9.0 to 1.11.10
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel instance
nomisec
WORKING POC
4 stars
by GRodolphe · remote
https://github.com/GRodolphe/CVE-2025-49132_poc
This repository contains a functional Python-based exploit for CVE-2025-49132, demonstrating remote command execution (RCE) via a crafted HTTP request to a vulnerable endpoint. The exploit leverages file creation and execution through path traversal and PHP payload injection.
Classification
Working Poc 95%
Target:
Unknown (likely a web application with PHP and vulnerable locale handling)
No auth needed
Prerequisites:
Target must have a vulnerable endpoint at `/locales/locale.json` · PHP must be installed on the target system · Target must allow file creation in `/tmp`
nomisec
WORKING POC
4 stars
by qiaojojo · infoleak
https://github.com/qiaojojo/CVE-2025-49132_poc
This repository contains a functional exploit PoC for CVE-2025-49132, a path traversal vulnerability in Pterodactyl Panel. The script checks for the vulnerability by sending a crafted request to '/locales/locale.json' with path traversal sequences to access sensitive configuration files.
Classification
Working Poc 95%
Target:
Pterodactyl Panel (versions before v1.11.11)
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel instance
nomisec
WORKING POC
3 stars
by dollarboysushil · remote
https://github.com/dollarboysushil/CVE-2025-49132-Pterodactyl-Panel-Unauthenticated-Remote-Code-Execution-RCE-
The repository contains a functional Python exploit for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel <= 1.11.10. The exploit leverages directory traversal and improper input validation in the `/locales/locale.json` endpoint to write and execute arbitrary PHP payloads.
Classification
Working Poc 95%
Target:
Pterodactyl Panel <= 1.11.10
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel instance · Knowledge of the PEAR library path on the target system
nomisec
WORKING POC
2 stars
by str1keboo · remote
https://github.com/str1keboo/CVE-2025-49132
This repository contains a functional Python-based PoC for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel. The script demonstrates path traversal via the `/locales/locale.json` endpoint to achieve RCE and credential dumping.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
Target running vulnerable Pterodactyl Panel · Network access to the target
nomisec
WORKING POC
2 stars
by pxxdrobits · poc
https://github.com/pxxdrobits/CVE-2025-49132
This repository contains a functional Python exploit for CVE-2025-49132, targeting Pterodactyl Panel. The exploit automates the discovery of exposed configuration files, extracts MySQL credentials, and creates an admin user by leveraging a path traversal vulnerability.
Classification
Working Poc 95%
Attack Type
Info Leak | Auth Bypass
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
Target URL list in a text file · Network access to the vulnerable Pterodactyl Panel
nomisec
WORKING POC
2 stars
by 0xtensho · poc
https://github.com/0xtensho/CVE-2025-49132-poc
This repository contains a functional exploit for CVE-2025-49132, which leverages a file inclusion vulnerability in Pterodactyl Panel to achieve Remote Code Execution (RCE) via the `pearcmd.php` script. The PoC uses curl commands to inject malicious PHP code into a temporary file and then includes it to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
Access to the target server's web interface · Curl installed on the attacker's machine
nomisec
WORKING POC
1 stars
by Ahmedf000 · remote
https://github.com/Ahmedf000/CVE-2025-49132_HTB_SEASON10
This repository contains a functional exploit for CVE-2025-49132, targeting Pterodactyl Panel < v1.11.11. The exploit chains path traversal with PEAR command injection to achieve unauthenticated remote code execution.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < v1.11.11
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel instance
nomisec
WORKING POC
1 stars
by rippsec · poc
https://github.com/rippsec/CVE-2025-49132-PHP-PEAR
This repository contains a functional Python-based exploit for CVE-2025-49132, targeting an unauthenticated RCE vulnerability in Pterodactyl Panel via PHP PEAR's `pearcmd.php`. The exploit leverages path traversal and PEAR's `config-create` command to write and execute arbitrary PHP payloads.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
PHP PEAR installed on target · Access to `/locales/locale.json` endpoint
nomisec
WORKING POC
1 stars
by rippxsec · poc
https://github.com/rippxsec/CVE-2025-49132-PHP-PEAR
This repository contains a functional Python-based exploit for CVE-2025-49132, targeting an unauthenticated RCE vulnerability in Pterodactyl Panel via PHP PEAR's `pearcmd.php` functionality. The exploit leverages path traversal and PEAR's `config-create` command to write and execute arbitrary PHP code.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
PHP PEAR installed on the target system · Access to the `/locales/locale.json` endpoint
nomisec
WORKING POC
1 stars
by Pwndalf · remote
https://github.com/Pwndalf/CVE-2025-49132-PoC
This repository contains a functional Python-based exploit for CVE-2025-49132, targeting Pterodactyl Panel versions prior to 1.11.11. The exploit leverages insufficient input validation to achieve remote code execution via a crafted HTTP request that writes and executes a malicious PHP payload.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
Python 3.8+ · pycurl library · TCP listener for reverse shell
nomisec
WORKING POC
1 stars
by ramzihafiz · remote
https://github.com/ramzihafiz/CVE-2025-49132
This repository contains a functional Python-based exploit for CVE-2025-49132, which leverages a path traversal vulnerability to create a webshell and achieve remote code execution (RCE) via a reverse shell. The exploit uses curl commands to deliver payloads that write and decode a PHP webshell, then triggers a reverse shell connection.
Classification
Working Poc 95%
Target:
PEAR (PHP Extension and Application Repository)
No auth needed
Prerequisites:
Target host running vulnerable PEAR installation · Network access to the target · Listener set up for reverse shell
nomisec
WRITEUP
by karimelsheikh1 · poc
https://github.com/karimelsheikh1/HTB-Pterodactyl-Writeup
This is a detailed technical writeup for HackTheBox's Pterodactyl machine, covering an attack chain involving CVE-2025-49132 (unauthenticated LFI-to-RCE in Pterodactyl Panel), credential extraction, and a privilege escalation chain using CVE-2025-6018 and CVE-2025-6019.
Classification
Writeup 100%
Attack Type
Rce | Lpe | Auth Bypass
Target:
Pterodactyl Panel v1.11.10, openSUSE Leap 15.6
No auth needed
Prerequisites:
Network access to target · PHP-PEAR enabled · MySQL credentials extraction · SSH access
nomisec
WRITEUP
by V0idW1re · poc
https://github.com/V0idW1re/HTB-Pterodactyl-Writeup
This is a detailed technical writeup of an attack chain involving CVE-2025-49132 (LFI in Pterodactyl Panel) and subsequent privilege escalation via CVE-2025-6018 and CVE-2025-6019. It includes root cause analysis, exploit steps, and remediation guidance.
Classification
Writeup 100%
Attack Type
Info Leak | Rce | Lpe
Target:
Pterodactyl Panel v1.11.10, openSUSE Leap 15.6
No auth needed
Prerequisites:
Network access to target · Pterodactyl Panel v1.11.10 · openSUSE Leap 15.6 with specific PAM and udisks2 configurations
nomisec
WRITEUP
by V0idW1re · poc
https://github.com/V0idW1re/htb-pterodactyl-writeup
This is a detailed technical writeup of an attack chain against HackTheBox's Pterodactyl machine, including CVE-2025-49132 (LFI), RCE via PEAR, and privilege escalation via PAM bypass and udisks2 race condition.
Classification
Writeup 100%
Attack Type
Info Leak | Rce | Lpe
Target:
Pterodactyl Panel v1.11.10, openSUSE Leap 15.6
No auth needed
Prerequisites:
Network access to target · PHP with register_argc_argv=On · PEAR installed · PAM with user_readenv=1 · udisks2 v2.9.2
nomisec
SCANNER
by unixskid · poc
https://github.com/unixskid/CVE-2025-49132
The repository contains a Python script that scans for CVE-2025-49132, an unauthenticated information disclosure vulnerability in Pterodactyl Panel. It checks for exposed database credentials via a path traversal attack but does not include exploit code for RCE.
Classification
Scanner 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
target URL list
nomisec
SCANNER
by revasec · poc
https://github.com/revasec/CVE-2025-49132
The repository contains a Python script that scans for CVE-2025-49132, an unauthenticated information disclosure vulnerability in Pterodactyl Panel. It checks for exposed database credentials via a path traversal attack but does not include exploit code for RCE.
Classification
Scanner 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
target URL list
nomisec
WORKING POC
by 4nuxd · remote
https://github.com/4nuxd/CVE-2025-49132
The PoC demonstrates an unauthenticated remote code execution (RCE) vulnerability in Pterodactyl Panel via the /locales/locale.json endpoint by manipulating the locale and namespace parameters to write and execute arbitrary PHP code. The exploit uses curl commands to deliver the payload and trigger execution.
Classification
Working Poc 95%
Target:
Pterodactyl Panel (version not specified)
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel instance · PHP PEAR path (default: /usr/share/php/PEAR)
github
WORKING POC
by Kl3lCrypt · pythonpoc
https://github.com/Kl3lCrypt/cve-exploits/tree/main/CVE-2025-49132
The repository contains functional exploit code for multiple CVEs, including CVE-2025-49132, demonstrating authentication bypass and remote code execution vulnerabilities. The exploits are written in Bash and Python, targeting specific software versions with clear technical details.
Classification
Working Poc 95%
Attack Type
Rce, Auth Bypass
Target:
Joomla CMS (4.0.0-4.2.7), Searchor CLI (≤2.4.1)
No auth needed
Prerequisites:
target domain/IP · listener for reverse shell
nomisec
WORKING POC
by popyue · remote
https://github.com/popyue/CVE-2025-49132
This repository contains a functional exploit for CVE-2025-49132, an unauthenticated Local File Inclusion (LFI) vulnerability in Pterodactyl Panel that can be escalated to Remote Code Execution (RCE) via PHP's `pearcmd.php`. The exploit includes both LFI and RCE modes with interactive shell capabilities.
Classification
Working Poc 95%
Target:
Pterodactyl Panel <= 1.11.10
No auth needed
Prerequisites:
Target running vulnerable Pterodactyl Panel version · Network access to the target
nomisec
WORKING POC
by nik123-py · poc
https://github.com/nik123-py/CVE-2025-49132_HTB_SEASON10
This repository contains a functional exploit for CVE-2025-49132, targeting Pterodactyl Panel < v1.11.11. The exploit chains path traversal with PEAR command injection to achieve unauthenticated remote code execution.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < v1.11.11
No auth needed
Prerequisites:
Access to the target's `/locales/locale.json` endpoint · PEAR installed on the target system
nomisec
WORKING POC
by rippxsec · poc
https://github.com/rippxsec/CVE-2025-49132
This repository contains a functional exploit for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel via PHP PEAR method abuse. The exploit leverages path traversal and PEAR's config-create command to write and execute arbitrary PHP code.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
PEAR installation on target system · access to /locales/locale.json endpoint
nomisec
WORKING POC
by rippsec · poc
https://github.com/rippsec/CVE-2025-49132
This repository contains a functional exploit for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel. The exploit leverages path traversal and PHP PEAR's `pearcmd.php` to write and execute arbitrary PHP code.
Classification
Working Poc 100%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
Access to the vulnerable endpoint `/locales/locale.json` · PHP PEAR installed on the target system
nomisec
WORKING POC
by scroollocker · remote
https://github.com/scroollocker/CVE-2025-49132
This repository contains a functional Python exploit for CVE-2025-49132, which leverages a file write vulnerability in the Pterodactyl Panel's locale.json endpoint to achieve unauthenticated remote code execution (RCE). The exploit writes a malicious PHP payload to a writable directory and then triggers its execution via a secondary request.
Classification
Working Poc 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
Network access to the target Pterodactyl Panel instance · Knowledge of the target's PEAR path (defaults to /usr/share/php/PEAR)
nomisec
WORKING POC
by thealchimist86 · remote
https://github.com/thealchimist86/CVE-2025-49132-Pterodactyl-Panel-RCE
The repository contains a functional exploit for CVE-2025-49132, targeting a remote code execution vulnerability in the Pterodactyl Panel due to improper input validation in locale handling. The exploit automates the discovery of PEAR paths and crafts malicious requests to achieve RCE.
Classification
Working Poc 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
Access to the Pterodactyl Panel endpoint · PEAR library path on the target system
nomisec
WORKING POC
by matesz44 · remote
https://github.com/matesz44/CVE-2025-49132
This script exploits an unauthenticated Local File Inclusion (LFI) vulnerability in Pterodactyl Panel to achieve Remote Code Execution (RCE) via the 'pearcmd' feature. It writes a malicious PHP file to the target system and executes arbitrary commands.
Classification
Working Poc 95%
Target:
Pterodactyl Panel (version not specified)
No auth needed
Prerequisites:
Target must have Pterodactyl Panel installed · PEAR paths must be accessible · curl and uuidgen must be available on the attacker's system
nomisec
WORKING POC
by kerburenthusiasm · remote
https://github.com/kerburenthusiasm/CVE-2025-49132-PoC
This repository contains a functional PoC for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel <= 1.11.10. The exploit leverages unsanitized `locale` and `namespace` parameters to trigger arbitrary file inclusion and execution via Laravel's translation loader.
Classification
Working Poc 95%
Target:
Pterodactyl Panel <= 1.11.10
No auth needed
Prerequisites:
Access to the target's `/locales/locale.json` endpoint · Presence of `pearcmd.php` on the target system
nomisec
WORKING POC
by 0xf3d0rq · poc
https://github.com/0xf3d0rq/CVE-2025-49132
The repository contains a functional exploit for CVE-2025-49132, targeting Pterodactyl's arbitrary file read vulnerability via path traversal in the `locales/locale.json` endpoint. It extracts database credentials and other sensitive configuration details by manipulating the `locale` and `namespace` parameters.
Classification
Working Poc 95%
Target:
Pterodactyl game server management panel
No auth needed
Prerequisites:
Access to the target's `locales/locale.json` endpoint
nomisec
SCANNER
by WebSafety-2tina · remote
https://github.com/WebSafety-2tina/CVE-2025-49132
This repository contains a scanner tool designed to detect and extract database configuration information from Pterodactyl Panel instances by exploiting a path traversal vulnerability in the `/locales/locale.json` endpoint. It supports multiple execution modes (single-threaded, multi-threaded, and async) and includes features like proxy support, error retries, and result categorization.
Classification
Scanner 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
List of target URLs in a file (default: url.txt) · Python environment with required libraries (requests, aiohttp, urllib3)
nomisec
SCANNER
by melonlonmeo · infoleak
https://github.com/melonlonmeo/CVE-2025-49132
The repository contains a Python-based scanner for CVE-2025-49132, which targets a path traversal vulnerability in a web application to leak database and app configuration files. It does not include exploit code for achieving RCE or other offensive actions, only detection and information leakage.
Classification
Scanner 95%
Target:
Unknown (likely a web application using a specific framework with path traversal in locale handling)
No auth needed
Prerequisites:
Network access to the target web application · Vulnerable endpoint exposed
nomisec
WORKING POC
by typicalsmc · poc
https://github.com/typicalsmc/CVE-2025-49132-PoC
This repository contains functional exploit code for CVE-2025-49132, which targets a path traversal vulnerability in Pterodactyl Panel. The PoC includes scripts to forge Laravel session cookies and decrypt them, enabling unauthorized API access.
Classification
Working Poc 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
Exposed Redis Server · Panel URL · APP_KEY and Redis Database Password
vulncheck_xdb
SUSPICIOUS
remote
https://github.com/adamshaikhma/CVE-2026-1844
The repository claims to provide an exploit for CVE-2026-1844 but lacks any technical details or exploit code, instead directing users to an external download link via a URL shortener.
Classification
Suspicious 90%
Target:
PixelYourSite PRO plugin for WordPress (versions up to and including 12.4.0.2)
No auth needed
Prerequisites:
none specified
vulncheck_xdb
WORKING POC
remote
https://github.com/xffsec/CVE-2025-49132
This repository contains a functional proof-of-concept exploit for CVE-2025-49132, an unauthenticated remote code execution vulnerability in Pterodactyl Panel versions prior to 1.11.11. The exploit leverages path traversal and PHP PEAR's `pearcmd.php` functionality to write and execute arbitrary PHP code on the target system.
Classification
Working Poc 95%
Target:
Pterodactyl Panel < 1.11.11
No auth needed
Prerequisites:
Access to the `/locales/locale.json` endpoint · PHP PEAR installed on the target system
vulncheck_xdb
WORKING POC
remote
https://github.com/malw0re/CVE-2025-49132---Pterodactyl-RCE-HTB-Season-10-
This repository contains a functional Python exploit for CVE-2025-49132, an unauthenticated RCE vulnerability in Pterodactyl Panel. The exploit leverages LFI in the /locales/locale.json endpoint to interact with pearcmd.php, enabling arbitrary file creation and command execution.
Classification
Working Poc 95%
Target:
Pterodactyl Panel (prior to v1.11.11)
No auth needed
Prerequisites:
Target running vulnerable Pterodactyl Panel · Network access to the target
vulncheck_xdb
WORKING POC
remote
https://github.com/nfoltc/CVE-2025-49132
This repository contains a functional Python exploit for CVE-2025-49132, targeting Pterodactyl Panel. The exploit automates the discovery of exposed configuration files, extracts MySQL credentials, and creates an admin user by leveraging a path traversal vulnerability.
Classification
Working Poc 95%
Target:
Pterodactyl Panel
No auth needed
Prerequisites:
Target URL list · Python environment with required dependencies