Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21696: CWE-400: Uncontrolled Resource Consumption in pterodactyl wings

0
High
VulnerabilityCVE-2026-21696cvecve-2026-21696cwe-400
Published: Mon Jan 19 2026 (01/19/2026, 19:25:43 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: wings

Description

CVE-2026-21696 is a high-severity vulnerability in Pterodactyl Wings versions 1. 7. 0 up to but not including 1. 12. 0. It arises from Wings not respecting SQLite's maximum parameter limit when deleting activity log entries, causing deletion queries to fail and entries to accumulate indefinitely. This leads to repeated reprocessing and uploading of the same activity logs, which grows over time and can exhaust the disk space of the panel's database server. The vulnerability can be exploited by a low-privileged user without authentication or user interaction. The issue is fixed in version 1. 12.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:00:41 UTC

Technical Analysis

CVE-2026-21696 is an uncontrolled resource consumption vulnerability (CWE-400) affecting Wings, the server control plane component of the Pterodactyl open-source game server management panel. The flaw exists in versions from 1.7.0 up to but not including 1.12.0. Wings uses an SQLite database to store activity log entries. When processing these logs, Wings attempts to delete processed entries in bulk using a single SQL query. However, it does not account for SQLite's maximum parameter limit of 32,766 variables per query (as of SQLite 3.32.0). If the deletion query exceeds this limit, SQLite returns an error and no entries are deleted. Consequently, these entries remain in the database and are reprocessed and resent to the panel repeatedly during each cron job execution. Each cycle adds new activity entries, causing the volume of data sent to grow exponentially. Over time, this behavior leads to the panel's database server running out of disk space, resulting in denial of service conditions. The vulnerability can be triggered by a low-privileged user without authentication or user interaction, increasing its risk. The issue was addressed and fixed in Wings version 1.12.0 by properly handling the SQLite parameter limit during deletion operations. No known exploits are reported in the wild as of the publication date. The CVSS 4.0 score is 8.3 (high severity) reflecting network attack vector, low complexity, no privileges or user interaction required, and high impact on availability.

Potential Impact

For European organizations using Pterodactyl Wings versions between 1.7.0 and 1.12.0, this vulnerability poses a significant risk of denial of service due to disk space exhaustion on the panel's database server. This can disrupt game server management operations, impacting service availability and potentially causing downtime for hosted game servers. The repeated flooding of activity logs can also degrade performance and increase operational overhead. Since the vulnerability can be exploited by low-privileged users without authentication, insider threats or compromised accounts could trigger the attack. This risk is particularly relevant for gaming companies, hosting providers, and esports organizations relying on Pterodactyl for server orchestration. The impact extends to any dependent services or customers relying on the availability of these game servers. Additionally, recovery from disk exhaustion may require manual intervention and data cleanup, increasing operational costs and downtime.

Mitigation Recommendations

The primary mitigation is to upgrade all affected Wings installations to version 1.12.0 or later, where the issue is fixed. Until upgrades can be applied, organizations should implement monitoring of disk space usage on the panel's database server to detect abnormal growth early. Rate limiting or restricting activity log generation by low-privileged users can reduce the risk of exploitation. Applying network segmentation and access controls to limit which users can interact with Wings can also help. Regularly backing up the database and logs ensures recovery options in case of disk exhaustion. Administrators should audit user permissions to minimize the number of users capable of generating excessive activity logs. Finally, reviewing and tuning cron job frequency may reduce the impact of repeated processing cycles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-02T18:45:27.397Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e879b4623b1157cadb4ca

Added to database: 1/19/2026, 7:35:55 PM

Last enriched: 1/26/2026, 8:00:41 PM

Last updated: 2/7/2026, 12:42:40 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats