CVE-2025-69199: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.
AI Analysis
Technical Summary
CVE-2025-69199 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Wings component of the Pterodactyl panel, an open-source game server management platform. Wings acts as the server control plane, managing game server instances via websockets. Prior to version 1.12.0, Wings lacks proper rate limiting and throttling mechanisms on websocket connections. This deficiency allows a malicious actor to establish a large number of websocket connections simultaneously. Once connected, the attacker can request or send massive volumes of data through these sockets without any enforced limits on message size or frequency. This leads to excessive consumption of CPU, memory, and network bandwidth on the host system, potentially causing resource exhaustion and denial of service. The vulnerability does not require user interaction and can be exploited remotely without authentication, increasing its risk profile. The CVSS 4.0 base score is 8.3 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, but with high impact on availability. The vulnerability was publicly disclosed in January 2026, with no known exploits in the wild at the time of publication. The fix is included in Pterodactyl Wings version 1.12.0, which introduces proper rate limiting and message size restrictions on websocket connections to prevent resource exhaustion attacks.
Potential Impact
For European organizations, especially those operating game servers or hosting services using the Pterodactyl panel, this vulnerability poses a significant risk of denial of service. An attacker can degrade or completely disrupt server availability by exhausting CPU, memory, and network resources, impacting service continuity and user experience. This can lead to financial losses, reputational damage, and operational disruptions. Organizations relying on Pterodactyl Wings for critical infrastructure or multiplayer gaming platforms may face increased downtime and customer dissatisfaction. Additionally, resource exhaustion could be leveraged as a diversion tactic to mask other malicious activities. The lack of authentication requirement and ease of exploitation increase the likelihood of opportunistic attacks. Given the open-source nature of Pterodactyl, smaller European gaming communities and hosting providers may be particularly vulnerable if they have not applied the patch.
Mitigation Recommendations
1. Upgrade all Pterodactyl Wings instances to version 1.12.0 or later immediately to apply the official patch that introduces rate limiting and message size restrictions on websocket connections. 2. Implement network-level controls such as firewall rules or Web Application Firewalls (WAFs) to limit the number of simultaneous websocket connections from a single IP address and restrict unusually large data transfers. 3. Monitor websocket traffic patterns for abnormal connection counts or data volumes indicative of abuse. 4. Employ resource usage monitoring and alerting on CPU, memory, and network bandwidth to detect early signs of resource exhaustion. 5. Consider deploying rate limiting proxies or reverse proxies in front of Wings to enforce additional throttling policies. 6. Review and restrict access to Wings servers to trusted networks or VPNs where feasible to reduce exposure. 7. Maintain an incident response plan for denial of service scenarios, including rapid patch deployment and traffic filtering. 8. Regularly audit and update all components of the Pterodactyl panel and associated infrastructure to minimize exposure to known vulnerabilities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Poland, Spain, Italy
CVE-2025-69199: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel
Description
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-69199 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Wings component of the Pterodactyl panel, an open-source game server management platform. Wings acts as the server control plane, managing game server instances via websockets. Prior to version 1.12.0, Wings lacks proper rate limiting and throttling mechanisms on websocket connections. This deficiency allows a malicious actor to establish a large number of websocket connections simultaneously. Once connected, the attacker can request or send massive volumes of data through these sockets without any enforced limits on message size or frequency. This leads to excessive consumption of CPU, memory, and network bandwidth on the host system, potentially causing resource exhaustion and denial of service. The vulnerability does not require user interaction and can be exploited remotely without authentication, increasing its risk profile. The CVSS 4.0 base score is 8.3 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, but with high impact on availability. The vulnerability was publicly disclosed in January 2026, with no known exploits in the wild at the time of publication. The fix is included in Pterodactyl Wings version 1.12.0, which introduces proper rate limiting and message size restrictions on websocket connections to prevent resource exhaustion attacks.
Potential Impact
For European organizations, especially those operating game servers or hosting services using the Pterodactyl panel, this vulnerability poses a significant risk of denial of service. An attacker can degrade or completely disrupt server availability by exhausting CPU, memory, and network resources, impacting service continuity and user experience. This can lead to financial losses, reputational damage, and operational disruptions. Organizations relying on Pterodactyl Wings for critical infrastructure or multiplayer gaming platforms may face increased downtime and customer dissatisfaction. Additionally, resource exhaustion could be leveraged as a diversion tactic to mask other malicious activities. The lack of authentication requirement and ease of exploitation increase the likelihood of opportunistic attacks. Given the open-source nature of Pterodactyl, smaller European gaming communities and hosting providers may be particularly vulnerable if they have not applied the patch.
Mitigation Recommendations
1. Upgrade all Pterodactyl Wings instances to version 1.12.0 or later immediately to apply the official patch that introduces rate limiting and message size restrictions on websocket connections. 2. Implement network-level controls such as firewall rules or Web Application Firewalls (WAFs) to limit the number of simultaneous websocket connections from a single IP address and restrict unusually large data transfers. 3. Monitor websocket traffic patterns for abnormal connection counts or data volumes indicative of abuse. 4. Employ resource usage monitoring and alerting on CPU, memory, and network bandwidth to detect early signs of resource exhaustion. 5. Consider deploying rate limiting proxies or reverse proxies in front of Wings to enforce additional throttling policies. 6. Review and restrict access to Wings servers to trusted networks or VPNs where feasible to reduce exposure. 7. Maintain an incident response plan for denial of service scenarios, including rapid patch deployment and traffic filtering. 8. Regularly audit and update all components of the Pterodactyl panel and associated infrastructure to minimize exposure to known vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T14:36:57.915Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e879b4623b1157cadb4cf
Added to database: 1/19/2026, 7:35:55 PM
Last enriched: 1/19/2026, 7:50:16 PM
Last updated: 1/19/2026, 9:58:54 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1177: SQL Injection in Yonyou KSOA
MediumCVE-2026-23944: CWE-306: Missing Authentication for Critical Function in getarcaneapp arcane
HighCVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
MediumCVE-2026-23880: CWE-20: Improper Input Validation in HackUCF OnboardLite
HighCVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.