Generated remediation guidance and an executive summary. No account required.
Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: Sending a test email and Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system. This has been addressed in release `1.6.6`. Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
Cite this page
CVE-2021-41273. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2021-41273
Use CWE-352, Pterodactyl vendor hub and Panel product page to widen CVE-2021-41273 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2026-26016, CVE-2021-41129 and CVE-2025-68954 for nearby disclosures in the same product family.