CVE-2025-69199: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.
AI Analysis
Technical Summary
CVE-2025-69199 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Wings component of the Pterodactyl open-source game server management panel. Wings acts as the server control plane, managing game server instances and communications primarily through websockets. Prior to version 1.12.0, Wings does not implement adequate rate limiting or throttling mechanisms on websocket connections. This deficiency allows a malicious actor to establish a large number of websocket connections simultaneously and request or send massive volumes of data through these channels. Because there is no cap on the number of connections or the size of messages, the attacker can exhaust the host system's CPU, memory, and network resources. This leads to degraded performance or complete denial of service for legitimate users. The vulnerability can be exploited remotely without user interaction and requires only low-level privileges, making it relatively easy to leverage in attacks. The vulnerability was publicly disclosed in early 2026 with a CVSS v4.0 score of 8.3, indicating high severity. The fix was introduced in Pterodactyl Wings version 1.12.0, which adds proper rate limiting and message size restrictions to mitigate resource exhaustion risks.
Potential Impact
For European organizations, especially those operating game servers or hosting gaming communities using Pterodactyl Wings, this vulnerability poses a significant risk of service disruption. An attacker exploiting this flaw can cause denial of service by overwhelming server resources, leading to downtime and degraded user experience. This can result in financial losses, reputational damage, and potential breach of service level agreements. Additionally, the increased CPU and memory load may affect other services running on the same infrastructure, amplifying the impact. Given the popularity of gaming and e-sports in Europe, organizations in this sector are particularly vulnerable. Furthermore, the lack of authentication requirements lowers the barrier for exploitation, increasing the likelihood of attacks. While no known exploits are currently reported in the wild, the high CVSS score and ease of exploitation warrant urgent attention.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Pterodactyl Wings instances to version 1.12.0 or later, where the vulnerability is patched. Organizations should audit their current deployments to identify vulnerable versions. In addition to patching, network-level controls should be implemented, such as limiting the number of websocket connections per client IP and enforcing maximum message sizes at the firewall or proxy level. Monitoring websocket traffic patterns for anomalies can help detect ongoing exploitation attempts. Rate limiting and throttling mechanisms should be applied to prevent resource exhaustion. Isolating game server management infrastructure from other critical systems can reduce collateral impact. Regularly reviewing logs and setting alerts for unusual spikes in websocket connections or data volume is recommended. Finally, organizations should maintain an incident response plan tailored to denial of service scenarios involving game server management platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Poland
CVE-2025-69199: CWE-400: Uncontrolled Resource Consumption in pterodactyl panel
Description
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-69199 is a vulnerability classified under CWE-400 (Uncontrolled Resource Consumption) and CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Wings component of the Pterodactyl open-source game server management panel. Wings acts as the server control plane, managing game server instances and communications primarily through websockets. Prior to version 1.12.0, Wings does not implement adequate rate limiting or throttling mechanisms on websocket connections. This deficiency allows a malicious actor to establish a large number of websocket connections simultaneously and request or send massive volumes of data through these channels. Because there is no cap on the number of connections or the size of messages, the attacker can exhaust the host system's CPU, memory, and network resources. This leads to degraded performance or complete denial of service for legitimate users. The vulnerability can be exploited remotely without user interaction and requires only low-level privileges, making it relatively easy to leverage in attacks. The vulnerability was publicly disclosed in early 2026 with a CVSS v4.0 score of 8.3, indicating high severity. The fix was introduced in Pterodactyl Wings version 1.12.0, which adds proper rate limiting and message size restrictions to mitigate resource exhaustion risks.
Potential Impact
For European organizations, especially those operating game servers or hosting gaming communities using Pterodactyl Wings, this vulnerability poses a significant risk of service disruption. An attacker exploiting this flaw can cause denial of service by overwhelming server resources, leading to downtime and degraded user experience. This can result in financial losses, reputational damage, and potential breach of service level agreements. Additionally, the increased CPU and memory load may affect other services running on the same infrastructure, amplifying the impact. Given the popularity of gaming and e-sports in Europe, organizations in this sector are particularly vulnerable. Furthermore, the lack of authentication requirements lowers the barrier for exploitation, increasing the likelihood of attacks. While no known exploits are currently reported in the wild, the high CVSS score and ease of exploitation warrant urgent attention.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Pterodactyl Wings instances to version 1.12.0 or later, where the vulnerability is patched. Organizations should audit their current deployments to identify vulnerable versions. In addition to patching, network-level controls should be implemented, such as limiting the number of websocket connections per client IP and enforcing maximum message sizes at the firewall or proxy level. Monitoring websocket traffic patterns for anomalies can help detect ongoing exploitation attempts. Rate limiting and throttling mechanisms should be applied to prevent resource exhaustion. Isolating game server management infrastructure from other critical systems can reduce collateral impact. Regularly reviewing logs and setting alerts for unusual spikes in websocket connections or data volume is recommended. Finally, organizations should maintain an incident response plan tailored to denial of service scenarios involving game server management platforms.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-29T14:36:57.915Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e879b4623b1157cadb4cf
Added to database: 1/19/2026, 7:35:55 PM
Last enriched: 1/26/2026, 7:55:15 PM
Last updated: 2/7/2026, 7:00:04 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.