CVE-2025-68954: CWE-613: Insufficient Session Expiration in pterodactyl panel
Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below do not revoke active SFTP connections when a user is removed from a server instance or has their permissions changes with respect to file access over SFTP. This allows a user that was already connected to SFTP to remain connected and access files even after their permissions are revoked. A user must have been connected to SFTP at the time of their permissions being revoked in order for this vulnerability to be exploited. This issue is fixed in version 1.12.0.
AI Analysis
Technical Summary
CVE-2025-68954 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting the Pterodactyl game server management panel, specifically versions prior to 1.12.0. The vulnerability arises because the system fails to revoke active SFTP connections when a user's permissions are changed or when the user is removed from a server instance. This means that if a user is connected via SFTP at the time their permissions are revoked, their session remains active and they retain access to files they should no longer be able to access. This flaw undermines the access control mechanisms by allowing continued unauthorized access, violating confidentiality and integrity principles. The vulnerability requires that the user already has an active SFTP session at the time of permission revocation, and the attacker must have at least high privileges to initiate the permission changes (as indicated by the CVSS vector requiring privileges). The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 4.0 score of 7.5 reflects a high severity due to the potential for unauthorized data access and the ease of exploitation once conditions are met. The issue is fixed in Pterodactyl panel version 1.12.0, which properly terminates or revokes active SFTP sessions upon permission changes. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to organizations relying on Pterodactyl for game server management, especially those managing sensitive or proprietary game data.
Potential Impact
For European organizations, the impact of CVE-2025-68954 can be substantial, particularly for those operating game servers or hosting services using Pterodactyl panel versions below 1.12.0. Unauthorized continued access to files via persistent SFTP sessions after permission revocation can lead to data leakage, intellectual property theft, or unauthorized modification of game server files. This compromises confidentiality and integrity of data and may disrupt service availability if malicious actors alter critical files. The vulnerability could also facilitate lateral movement within networks if attackers leverage persistent access to escalate privileges or pivot to other systems. Given the popularity of game hosting in Europe and the use of open-source management tools, organizations in sectors such as gaming, digital entertainment, and cloud hosting are at heightened risk. The requirement for an active session at the time of permission change somewhat limits the attack window but does not eliminate risk, especially in environments with frequent permission updates or user removals. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Upgrade all Pterodactyl panel installations to version 1.12.0 or later immediately to ensure the vulnerability is patched. 2. Implement monitoring and auditing of active SFTP sessions to detect and terminate stale or unauthorized connections promptly. 3. Enforce strict session management policies that include automatic session expiration and forced logout upon permission changes or user removals. 4. Use network segmentation to limit the impact of compromised SFTP sessions and restrict access to critical file systems. 5. Regularly review user permissions and access logs to identify anomalies or unauthorized access attempts. 6. Educate administrators on the importance of terminating active sessions when modifying user permissions. 7. Consider deploying additional access control mechanisms such as multi-factor authentication for administrative actions that alter permissions. 8. If immediate upgrade is not feasible, implement manual session termination procedures upon permission changes as a temporary workaround.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Poland, Italy
CVE-2025-68954: CWE-613: Insufficient Session Expiration in pterodactyl panel
Description
Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below do not revoke active SFTP connections when a user is removed from a server instance or has their permissions changes with respect to file access over SFTP. This allows a user that was already connected to SFTP to remain connected and access files even after their permissions are revoked. A user must have been connected to SFTP at the time of their permissions being revoked in order for this vulnerability to be exploited. This issue is fixed in version 1.12.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-68954 is a vulnerability classified under CWE-613 (Insufficient Session Expiration) affecting the Pterodactyl game server management panel, specifically versions prior to 1.12.0. The vulnerability arises because the system fails to revoke active SFTP connections when a user's permissions are changed or when the user is removed from a server instance. This means that if a user is connected via SFTP at the time their permissions are revoked, their session remains active and they retain access to files they should no longer be able to access. This flaw undermines the access control mechanisms by allowing continued unauthorized access, violating confidentiality and integrity principles. The vulnerability requires that the user already has an active SFTP session at the time of permission revocation, and the attacker must have at least high privileges to initiate the permission changes (as indicated by the CVSS vector requiring privileges). The vulnerability does not require user interaction and can be exploited remotely over the network. The CVSS 4.0 score of 7.5 reflects a high severity due to the potential for unauthorized data access and the ease of exploitation once conditions are met. The issue is fixed in Pterodactyl panel version 1.12.0, which properly terminates or revokes active SFTP sessions upon permission changes. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to organizations relying on Pterodactyl for game server management, especially those managing sensitive or proprietary game data.
Potential Impact
For European organizations, the impact of CVE-2025-68954 can be substantial, particularly for those operating game servers or hosting services using Pterodactyl panel versions below 1.12.0. Unauthorized continued access to files via persistent SFTP sessions after permission revocation can lead to data leakage, intellectual property theft, or unauthorized modification of game server files. This compromises confidentiality and integrity of data and may disrupt service availability if malicious actors alter critical files. The vulnerability could also facilitate lateral movement within networks if attackers leverage persistent access to escalate privileges or pivot to other systems. Given the popularity of game hosting in Europe and the use of open-source management tools, organizations in sectors such as gaming, digital entertainment, and cloud hosting are at heightened risk. The requirement for an active session at the time of permission change somewhat limits the attack window but does not eliminate risk, especially in environments with frequent permission updates or user removals. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.
Mitigation Recommendations
1. Upgrade all Pterodactyl panel installations to version 1.12.0 or later immediately to ensure the vulnerability is patched. 2. Implement monitoring and auditing of active SFTP sessions to detect and terminate stale or unauthorized connections promptly. 3. Enforce strict session management policies that include automatic session expiration and forced logout upon permission changes or user removals. 4. Use network segmentation to limit the impact of compromised SFTP sessions and restrict access to critical file systems. 5. Regularly review user permissions and access logs to identify anomalies or unauthorized access attempts. 6. Educate administrators on the importance of terminating active sessions when modifying user permissions. 7. Consider deploying additional access control mechanisms such as multi-factor authentication for administrative actions that alter permissions. 8. If immediate upgrade is not feasible, implement manual session termination procedures upon permission changes as a temporary workaround.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-26T21:39:55.482Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c5ce23839e44175a692bb
Added to database: 1/6/2026, 12:52:50 AM
Last enriched: 1/6/2026, 1:07:20 AM
Last updated: 1/8/2026, 10:18:33 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21874: CWE-772: Missing Release of Resource after Effective Lifetime in zauberzeug nicegui
MediumCVE-2026-21873: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
HighCVE-2026-21872: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21871: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-21894: CWE-290: Authentication Bypass by Spoofing in n8n-io n8n
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.