Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69199: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel

0
High
VulnerabilityCVE-2025-69199cvecve-2025-69199cwe-400cwe-770
Published: Mon Jan 19 2026 (01/19/2026, 19:17:53 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: panel

Description

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:55:15 UTC

Technical Analysis

CVE-2025-69199 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Wings component of the Pterodactyl open-source game server management panel. Wings acts as the server control plane, managing game server instances and communications primarily through websockets. Prior to version 1.12.0, Wings does not implement adequate rate limiting or throttling mechanisms on websocket connections. This deficiency allows a malicious actor to establish a large number of websocket connections simultaneously and request or send massive volumes of data through these channels. Because there is no cap on the number of connections or the size of messages, the attacker can exhaust the host system's CPU, memory, and network resources. This leads to degraded performance or complete denial of service for legitimate users. The vulnerability can be exploited remotely without user interaction and requires only low-level privileges, making it relatively easy to leverage in attacks. The vulnerability was publicly disclosed in early 2026 with a CVSS v4.0 score of 8.3, indicating high severity. The fix was introduced in Pterodactyl Wings version 1.12.0, which adds proper rate limiting and message size restrictions to mitigate resource exhaustion risks.

Potential Impact

For European organizations, especially those operating game servers or hosting gaming communities using Pterodactyl Wings, this vulnerability poses a significant risk of service disruption. An attacker exploiting this flaw can cause denial of service by overwhelming server resources, leading to downtime and degraded user experience. This can result in financial losses, reputational damage, and potential breach of service level agreements. Additionally, the increased CPU and memory load may affect other services running on the same infrastructure, amplifying the impact. Given the popularity of gaming and e-sports in Europe, organizations in this sector are particularly vulnerable. Furthermore, the lack of authentication requirements lowers the barrier for exploitation, increasing the likelihood of attacks. While no known exploits are currently reported in the wild, the high CVSS score and ease of exploitation warrant urgent attention.

Mitigation Recommendations

The primary mitigation is to upgrade all affected Pterodactyl Wings instances to version 1.12.0 or later, where the vulnerability is patched. Organizations should audit their current deployments to identify vulnerable versions. In addition to patching, network-level controls should be implemented, such as limiting the number of websocket connections per client IP and enforcing maximum message sizes at the firewall or proxy level. Monitoring websocket traffic patterns for anomalies can help detect ongoing exploitation attempts. Rate limiting and throttling mechanisms should be applied to prevent resource exhaustion. Isolating game server management infrastructure from other critical systems can reduce collateral impact. Regularly reviewing logs and setting alerts for unusual spikes in websocket connections or data volume is recommended. Finally, organizations should maintain an incident response plan tailored to denial of service scenarios involving game server management platforms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-29T14:36:57.915Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e879b4623b1157cadb4cf

Added to database: 1/19/2026, 7:35:55 PM

Last enriched: 1/26/2026, 7:55:15 PM

Last updated: 2/7/2026, 7:00:04 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats