Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69198: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel

0
Medium
VulnerabilityCVE-2025-69198cvecve-2025-69198cwe-400cwe-413
Published: Mon Jan 19 2026 (01/19/2026, 19:05:38 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: panel

Description

Pterodactyl is a free, open-source game server management panel. Pterodactyl implements rate limits that are applied to the total number of resources (e.g. databases, port allocations, or backups) that can exist for an individual server. These resource limits are applied on a per-server basis, and validated during the request cycle. However, in versions prior to 1.12.0, it is possible for a malicious user to send a massive volume of requests at the same time that would create more resources than the server is allotted. This is because the validation occurs early in the request cycle and does not lock the target resource while it is processing. As a result sending a large volume of requests at the same time would lead all of those requests to validate as not using any of the target resources, and then all creating the resources at the same time. As a result a server would be able to create more databases, allocations, or backups than configured. A malicious user is able to deny resources to other users on the system, and may be able to excessively consume the limited allocations for a node, or fill up backup space faster than is allowed by the system. Version 1.12.0 fixes the issue.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:55:02 UTC

Technical Analysis

The vulnerability CVE-2025-69198 affects Pterodactyl panel versions prior to 1.12.0 and is classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-413 (Improper Resource Shutdown or Release). Pterodactyl enforces resource limits on a per-server basis, restricting the number of databases, port allocations, or backups a server can create. However, the validation logic occurs early in the request cycle without locking the target resource, allowing a race condition. A malicious user can send a high volume of concurrent requests to create resources simultaneously. Because each request validates before any resource is actually allocated, all requests pass validation and proceed to create resources beyond the configured limits. This leads to resource exhaustion, potentially denying service to legitimate users by consuming all available allocations or filling backup storage prematurely. Exploitation requires authenticated access with low privileges but no user interaction. The vulnerability has a CVSS 4.0 base score of 6.0 (medium severity), reflecting network attack vector, low attack complexity, partial privileges required, no user interaction, and high impact on availability. No known exploits are currently reported in the wild. The issue is resolved in Pterodactyl version 1.12.0 by presumably adding proper locking or atomic validation during resource creation.

Potential Impact

For European organizations using Pterodactyl panel versions prior to 1.12.0, this vulnerability can lead to denial of service conditions by exhausting server resources such as databases, port allocations, or backup storage. This can disrupt game server operations, degrade user experience, and increase operational costs due to resource overconsumption. Organizations hosting multiple game servers on shared nodes may see widespread impact if a single compromised or malicious user triggers the exploit. The availability of game services is the primary concern, but indirect impacts include potential loss of revenue and reputational damage. Since the vulnerability requires authenticated access, insider threats or compromised accounts pose a significant risk. The lack of user interaction and low complexity of exploitation increase the likelihood of automated attacks. European gaming companies, hosting providers, and community servers relying on Pterodactyl are particularly vulnerable until patched.

Mitigation Recommendations

1. Upgrade all Pterodactyl panel installations to version 1.12.0 or later immediately to apply the official fix. 2. Implement additional rate limiting and request throttling at the web server or application firewall level to prevent burst request floods targeting resource creation endpoints. 3. Monitor resource creation logs and set alerts for abnormal spikes in database, port allocation, or backup creation activities. 4. Enforce strict access controls and audit authentication logs to detect and prevent misuse of low privilege accounts. 5. Consider deploying concurrency controls or locking mechanisms at the application or database layer if custom modifications exist. 6. Educate administrators and users about the risks of sharing credentials and the importance of strong authentication. 7. Regularly review and adjust resource quotas to balance operational needs and security. 8. Use network segmentation to isolate game server management panels from critical infrastructure where possible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T14:35:22.117Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e84184623b1157caa879f

Added to database: 1/19/2026, 7:20:56 PM

Last enriched: 1/26/2026, 7:55:02 PM

Last updated: 2/7/2026, 1:18:55 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats