Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21696: CWE-400: Uncontrolled Resource Consumption in pterodactyl wings

0
High
VulnerabilityCVE-2026-21696cvecve-2026-21696cwe-400
Published: Mon Jan 19 2026 (01/19/2026, 19:25:43 UTC)
Source: CVE Database V5
Vendor/Project: pterodactyl
Product: wings

Description

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Starting in version 1.7.0 and prior to version 1.12.0, Wings does not consider SQLite max parameter limit when processing activity log entries allowing for low privileged user to trigger a condition that floods the panel with activity records. After Wings sends activity logs to the panel it deletes the processed activity entries from the wings SQLite database. However, it does not consider the max parameter limit of SQLite, 32766 as of SQLite 3.32.0. If wings attempts to delete more than 32766 entries from the SQLite database in one query, it triggers an error (SQL logic error: too many SQL variables (1)) and does not remove any entries from the database. These entries are then indefinitely re-processed and resent to the panel each time the cron runs. By successfully exploiting this vulnerability, an attacker can trigger a situation where wings will keep uploading the same activity data to the panel repeatedly (growing each time to include new activity) until the panels' database server runs out of disk space. Version 1.12.0 fixes the issue.

AI-Powered Analysis

AILast updated: 01/19/2026, 19:50:31 UTC

Technical Analysis

CVE-2026-21696 is a resource exhaustion vulnerability classified under CWE-400, affecting Pterodactyl Wings, the server control plane component of the open-source Pterodactyl game server management panel. The vulnerability exists in versions from 1.7.0 up to but not including 1.12.0. Wings uses an SQLite database to store activity logs and periodically deletes processed entries. However, when deleting entries, Wings issues a single SQL query that attempts to delete more entries than SQLite's maximum parameter limit of 32,766 (introduced in SQLite 3.32.0). If the number of entries to delete exceeds this limit, SQLite returns an error, causing Wings to skip the deletion entirely. Consequently, these entries remain in the database and are reprocessed and resent to the panel repeatedly during each cron job execution. Each iteration adds new activity entries to the batch, causing the payload to grow exponentially. This behavior leads to uncontrolled resource consumption, specifically disk space exhaustion on the panel's database server, effectively causing a denial-of-service condition. The vulnerability can be triggered by a low-privileged user without requiring authentication or user interaction, increasing its risk profile. The issue was addressed in Wings version 1.12.0 by ensuring deletion queries respect SQLite's parameter limits, likely through batching or pagination of delete operations. No known exploits are reported in the wild as of the publication date. The CVSS 4.0 base score is 8.3 (high), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on availability.

Potential Impact

For European organizations using Pterodactyl Wings versions between 1.7.0 and 1.11.x, this vulnerability poses a significant risk of denial-of-service through disk space exhaustion on the panel's database server. This can disrupt game server management operations, causing downtime or degraded service availability for hosted game servers. The repeated flooding of activity logs can also increase database load and network traffic between Wings and the panel, potentially impacting other services sharing the same infrastructure. Since exploitation requires only low privileges and no user interaction, insider threats or compromised low-privileged accounts could trigger the attack. The impact extends to any dependent services relying on the panel's availability, including customer-facing game servers and administrative tools. Recovery from such an attack may require manual database cleanup or restoring from backups, increasing operational overhead. Given the popularity of Pterodactyl in the gaming community and among hosting providers, the vulnerability could affect a broad range of organizations, from small gaming communities to large-scale hosting providers in Europe.

Mitigation Recommendations

The primary mitigation is to upgrade Pterodactyl Wings to version 1.12.0 or later, where the issue is fixed. For organizations unable to upgrade immediately, implement the following specific mitigations: 1) Modify the Wings source code or configuration to batch delete operations into chunks smaller than SQLite's max parameter limit (e.g., delete entries in groups of 30,000 or fewer). 2) Monitor the size and growth rate of the Wings activity log database and set alerts for abnormal increases in disk usage or log volume. 3) Restrict low-privileged user permissions to limit the ability to generate excessive activity logs or trigger the vulnerability. 4) Regularly archive and purge old activity logs manually to prevent accumulation. 5) Isolate the Wings database server on dedicated storage with sufficient disk capacity and implement quotas or disk usage monitoring to prevent full disk conditions. 6) Employ network segmentation and access controls to limit exposure of Wings and the panel to untrusted users. These targeted mitigations reduce the risk of exploitation and limit the impact until a full upgrade can be performed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-02T18:45:27.397Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e879b4623b1157cadb4ca

Added to database: 1/19/2026, 7:35:55 PM

Last enriched: 1/19/2026, 7:50:31 PM

Last updated: 1/19/2026, 9:58:59 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats