CVSS 3.1 Score 6.1 of 10 (medium)


Published May 3, 2024
Updated: May 6, 2024


CVE-2024-34067 is a vulnerability affecting Pterodactyl, a free, open-source game server management panel built with PHP, React, and Go. Importing a malicious egg or gaining access to a wings instance could result in cross-site scripting (XSS) on the panel, potentially allowing an attacker to gain administrative privileges. The impacted components include Egg Docker images and Egg variables such as name, environment variable, default value, description, and validation rules. It is important to note that the malicious input would require an administrator to knowingly enter it, meaning it cannot be triggered by a normal panel user. The issue has been addressed in version 1.11.6 of Pterodactyl, and users are advised to update to this version as there are no workarounds available. This vulnerability has a base severity of MEDIUM and a CVSS v3.1 score of 6.1 out of 10.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-34067 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options