Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69198: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel

0
Medium
VulnerabilityCVE-2025-69198cvecve-2025-69198cwe-400cwe-413
Published: Mon Jan 19 2026 (01/19/2026, 19:05:38 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: panel

Description

Pterodactyl is a free, open-source game server management panel. Pterodactyl implements rate limits that are applied to the total number of resources (e.g. databases, port allocations, or backups) that can exist for an individual server. These resource limits are applied on a per-server basis, and validated during the request cycle. However, in versions prior to 1.12.0, it is possible for a malicious user to send a massive volume of requests at the same time that would create more resources than the server is allotted. This is because the validation occurs early in the request cycle and does not lock the target resource while it is processing. As a result sending a large volume of requests at the same time would lead all of those requests to validate as not using any of the target resources, and then all creating the resources at the same time. As a result a server would be able to create more databases, allocations, or backups than configured. A malicious user is able to deny resources to other users on the system, and may be able to excessively consume the limited allocations for a node, or fill up backup space faster than is allowed by the system. Version 1.12.0 fixes the issue.

AI-Powered Analysis

AILast updated: 01/19/2026, 19:35:41 UTC

Technical Analysis

Pterodactyl panel is an open-source game server management platform that enforces rate limits on resources such as databases, port allocations, and backups on a per-server basis. In versions prior to 1.12.0, the validation of these resource limits occurs early in the request processing cycle without applying locks on the target resource. This design flaw allows a race condition where a malicious user can flood the server with a large number of simultaneous requests to create resources. Each request passes validation independently, as the resource count is not updated or locked during processing, resulting in the creation of more resources than the configured limits. This uncontrolled resource consumption can exhaust node allocations, fill backup storage prematurely, and deny legitimate users access to resources. The vulnerability is tracked as CVE-2025-69198 with a CVSS 4.0 score of 6.0 (medium severity), indicating network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on availability. No known exploits are currently in the wild. The issue is resolved in Pterodactyl panel version 1.12.0 by implementing proper locking or atomic validation to prevent concurrent resource creation beyond limits.

Potential Impact

For European organizations using Pterodactyl panel versions prior to 1.12.0, this vulnerability can lead to significant disruption of game server management operations. Attackers can exhaust critical resources such as databases, port allocations, and backup storage, causing denial of service to legitimate users and potentially impacting service availability. This can degrade user experience, cause operational downtime, and increase administrative overhead to remediate resource exhaustion. Organizations hosting multiple game servers on shared nodes are particularly at risk, as one compromised or malicious user can affect others by consuming disproportionate resources. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be severe, especially for service providers or gaming communities relying on Pterodactyl for server orchestration. The medium CVSS score reflects moderate risk but should not be underestimated in environments with high resource contention or limited capacity.

Mitigation Recommendations

European organizations should immediately upgrade all Pterodactyl panel instances to version 1.12.0 or later, where the vulnerability is fixed. Until upgrades are completed, administrators should implement strict monitoring of resource usage and request rates to detect abnormal spikes indicative of exploitation attempts. Rate limiting at the network or application firewall level can help mitigate flooding of resource creation requests. Additionally, applying access controls to restrict resource creation privileges to trusted users reduces risk. Administrators should audit existing resource allocations to identify and clean up any excessive or orphaned resources created due to this vulnerability. Implementing alerting on resource exhaustion thresholds and backup storage utilization can provide early warning of abuse. Finally, consider isolating critical game server nodes to limit the blast radius of potential attacks exploiting this flaw.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T14:35:22.117Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e84184623b1157caa879f

Added to database: 1/19/2026, 7:20:56 PM

Last enriched: 1/19/2026, 7:35:41 PM

Last updated: 1/19/2026, 9:58:41 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats