CVE-2025-69198: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel
Pterodactyl is a free, open-source game server management panel. Pterodactyl implements rate limits that are applied to the total number of resources (e.g. databases, port allocations, or backups) that can exist for an individual server. These resource limits are applied on a per-server basis, and validated during the request cycle. However, in versions prior to 1.12.0, it is possible for a malicious user to send a massive volume of requests at the same time that would create more resources than the server is allotted. This is because the validation occurs early in the request cycle and does not lock the target resource while it is processing. As a result sending a large volume of requests at the same time would lead all of those requests to validate as not using any of the target resources, and then all creating the resources at the same time. As a result a server would be able to create more databases, allocations, or backups than configured. A malicious user is able to deny resources to other users on the system, and may be able to excessively consume the limited allocations for a node, or fill up backup space faster than is allowed by the system. Version 1.12.0 fixes the issue.
AI Analysis
Technical Summary
Pterodactyl panel is an open-source game server management platform that enforces rate limits on resources such as databases, port allocations, and backups on a per-server basis. In versions prior to 1.12.0, the validation of these resource limits occurs early in the request processing cycle without applying locks on the target resource. This design flaw allows a race condition where a malicious user can flood the server with a large number of simultaneous requests to create resources. Each request passes validation independently, as the resource count is not updated or locked during processing, resulting in the creation of more resources than the configured limits. This uncontrolled resource consumption can exhaust node allocations, fill backup storage prematurely, and deny legitimate users access to resources. The vulnerability is tracked as CVE-2025-69198 with a CVSS 4.0 score of 6.0 (medium severity), indicating network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on availability. No known exploits are currently in the wild. The issue is resolved in Pterodactyl panel version 1.12.0 by implementing proper locking or atomic validation to prevent concurrent resource creation beyond limits.
Potential Impact
For European organizations using Pterodactyl panel versions prior to 1.12.0, this vulnerability can lead to significant disruption of game server management operations. Attackers can exhaust critical resources such as databases, port allocations, and backup storage, causing denial of service to legitimate users and potentially impacting service availability. This can degrade user experience, cause operational downtime, and increase administrative overhead to remediate resource exhaustion. Organizations hosting multiple game servers on shared nodes are particularly at risk, as one compromised or malicious user can affect others by consuming disproportionate resources. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be severe, especially for service providers or gaming communities relying on Pterodactyl for server orchestration. The medium CVSS score reflects moderate risk but should not be underestimated in environments with high resource contention or limited capacity.
Mitigation Recommendations
European organizations should immediately upgrade all Pterodactyl panel instances to version 1.12.0 or later, where the vulnerability is fixed. Until upgrades are completed, administrators should implement strict monitoring of resource usage and request rates to detect abnormal spikes indicative of exploitation attempts. Rate limiting at the network or application firewall level can help mitigate flooding of resource creation requests. Additionally, applying access controls to restrict resource creation privileges to trusted users reduces risk. Administrators should audit existing resource allocations to identify and clean up any excessive or orphaned resources created due to this vulnerability. Implementing alerting on resource exhaustion thresholds and backup storage utilization can provide early warning of abuse. Finally, consider isolating critical game server nodes to limit the blast radius of potential attacks exploiting this flaw.
Affected Countries
Germany, United Kingdom, France, Netherlands, Poland, Sweden
CVE-2025-69198: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel
Description
Pterodactyl is a free, open-source game server management panel. Pterodactyl implements rate limits that are applied to the total number of resources (e.g. databases, port allocations, or backups) that can exist for an individual server. These resource limits are applied on a per-server basis, and validated during the request cycle. However, in versions prior to 1.12.0, it is possible for a malicious user to send a massive volume of requests at the same time that would create more resources than the server is allotted. This is because the validation occurs early in the request cycle and does not lock the target resource while it is processing. As a result sending a large volume of requests at the same time would lead all of those requests to validate as not using any of the target resources, and then all creating the resources at the same time. As a result a server would be able to create more databases, allocations, or backups than configured. A malicious user is able to deny resources to other users on the system, and may be able to excessively consume the limited allocations for a node, or fill up backup space faster than is allowed by the system. Version 1.12.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
Pterodactyl panel is an open-source game server management platform that enforces rate limits on resources such as databases, port allocations, and backups on a per-server basis. In versions prior to 1.12.0, the validation of these resource limits occurs early in the request processing cycle without applying locks on the target resource. This design flaw allows a race condition where a malicious user can flood the server with a large number of simultaneous requests to create resources. Each request passes validation independently, as the resource count is not updated or locked during processing, resulting in the creation of more resources than the configured limits. This uncontrolled resource consumption can exhaust node allocations, fill backup storage prematurely, and deny legitimate users access to resources. The vulnerability is tracked as CVE-2025-69198 with a CVSS 4.0 score of 6.0 (medium severity), indicating network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on availability. No known exploits are currently in the wild. The issue is resolved in Pterodactyl panel version 1.12.0 by implementing proper locking or atomic validation to prevent concurrent resource creation beyond limits.
Potential Impact
For European organizations using Pterodactyl panel versions prior to 1.12.0, this vulnerability can lead to significant disruption of game server management operations. Attackers can exhaust critical resources such as databases, port allocations, and backup storage, causing denial of service to legitimate users and potentially impacting service availability. This can degrade user experience, cause operational downtime, and increase administrative overhead to remediate resource exhaustion. Organizations hosting multiple game servers on shared nodes are particularly at risk, as one compromised or malicious user can affect others by consuming disproportionate resources. While the vulnerability does not directly compromise confidentiality or integrity, the availability impact can be severe, especially for service providers or gaming communities relying on Pterodactyl for server orchestration. The medium CVSS score reflects moderate risk but should not be underestimated in environments with high resource contention or limited capacity.
Mitigation Recommendations
European organizations should immediately upgrade all Pterodactyl panel instances to version 1.12.0 or later, where the vulnerability is fixed. Until upgrades are completed, administrators should implement strict monitoring of resource usage and request rates to detect abnormal spikes indicative of exploitation attempts. Rate limiting at the network or application firewall level can help mitigate flooding of resource creation requests. Additionally, applying access controls to restrict resource creation privileges to trusted users reduces risk. Administrators should audit existing resource allocations to identify and clean up any excessive or orphaned resources created due to this vulnerability. Implementing alerting on resource exhaustion thresholds and backup storage utilization can provide early warning of abuse. Finally, consider isolating critical game server nodes to limit the blast radius of potential attacks exploiting this flaw.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T14:35:22.117Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e84184623b1157caa879f
Added to database: 1/19/2026, 7:20:56 PM
Last enriched: 1/19/2026, 7:35:41 PM
Last updated: 1/19/2026, 9:58:41 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1177: SQL Injection in Yonyou KSOA
MediumCVE-2026-23944: CWE-306: Missing Authentication for Critical Function in getarcaneapp arcane
HighCVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
MediumCVE-2026-23880: CWE-20: Improper Input Validation in HackUCF OnboardLite
HighCVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.