CVE-2026-21696: CWE-400: Uncontrolled Resource Consumption in pterodactyl wings
CVE-2026-21696 is a high-severity vulnerability in Pterodactyl Wings versions 1. 7. 0 up to but not including 1. 12. 0. It arises from Wings not respecting SQLite's maximum parameter limit when deleting activity log entries, causing deletion queries to fail and entries to accumulate indefinitely. This leads to repeated reprocessing and uploading of the same activity logs, which grows over time and can exhaust the disk space of the panel's database server. The vulnerability can be exploited by a low-privileged user without authentication or user interaction. The issue is fixed in version 1. 12.
AI Analysis
Technical Summary
CVE-2026-21696 is an uncontrolled resource consumption vulnerability (CWE-400) affecting Wings, the server control plane component of the Pterodactyl open-source game server management panel. The flaw exists in versions from 1.7.0 up to but not including 1.12.0. Wings uses an SQLite database to store activity log entries. When processing these logs, Wings attempts to delete processed entries in bulk using a single SQL query. However, it does not account for SQLite's maximum parameter limit of 32,766 variables per query (as of SQLite 3.32.0). If the deletion query exceeds this limit, SQLite returns an error and no entries are deleted. Consequently, these entries remain in the database and are reprocessed and resent to the panel repeatedly during each cron job execution. Each cycle adds new activity entries, causing the volume of data sent to grow exponentially. Over time, this behavior leads to the panel's database server running out of disk space, resulting in denial of service conditions. The vulnerability can be triggered by a low-privileged user without authentication or user interaction, increasing its risk. The issue was addressed and fixed in Wings version 1.12.0 by properly handling the SQLite parameter limit during deletion operations. No known exploits are reported in the wild as of the publication date. The CVSS 4.0 score is 8.3 (high severity) reflecting network attack vector, low complexity, no privileges or user interaction required, and high impact on availability.
Potential Impact
For European organizations using Pterodactyl Wings versions between 1.7.0 and 1.12.0, this vulnerability poses a significant risk of denial of service due to disk space exhaustion on the panel's database server. This can disrupt game server management operations, impacting service availability and potentially causing downtime for hosted game servers. The repeated flooding of activity logs can also degrade performance and increase operational overhead. Since the vulnerability can be exploited by low-privileged users without authentication, insider threats or compromised accounts could trigger the attack. This risk is particularly relevant for gaming companies, hosting providers, and esports organizations relying on Pterodactyl for server orchestration. The impact extends to any dependent services or customers relying on the availability of these game servers. Additionally, recovery from disk exhaustion may require manual intervention and data cleanup, increasing operational costs and downtime.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Wings installations to version 1.12.0 or later, where the issue is fixed. Until upgrades can be applied, organizations should implement monitoring of disk space usage on the panel's database server to detect abnormal growth early. Rate limiting or restricting activity log generation by low-privileged users can reduce the risk of exploitation. Applying network segmentation and access controls to limit which users can interact with Wings can also help. Regularly backing up the database and logs ensures recovery options in case of disk exhaustion. Administrators should audit user permissions to minimize the number of users capable of generating excessive activity logs. Finally, reviewing and tuning cron job frequency may reduce the impact of repeated processing cycles.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Poland
CVE-2026-21696: CWE-400: Uncontrolled Resource Consumption in pterodactyl wings
Description
CVE-2026-21696 is a high-severity vulnerability in Pterodactyl Wings versions 1. 7. 0 up to but not including 1. 12. 0. It arises from Wings not respecting SQLite's maximum parameter limit when deleting activity log entries, causing deletion queries to fail and entries to accumulate indefinitely. This leads to repeated reprocessing and uploading of the same activity logs, which grows over time and can exhaust the disk space of the panel's database server. The vulnerability can be exploited by a low-privileged user without authentication or user interaction. The issue is fixed in version 1. 12.
AI-Powered Analysis
Technical Analysis
CVE-2026-21696 is an uncontrolled resource consumption vulnerability (CWE-400) affecting Wings, the server control plane component of the Pterodactyl open-source game server management panel. The flaw exists in versions from 1.7.0 up to but not including 1.12.0. Wings uses an SQLite database to store activity log entries. When processing these logs, Wings attempts to delete processed entries in bulk using a single SQL query. However, it does not account for SQLite's maximum parameter limit of 32,766 variables per query (as of SQLite 3.32.0). If the deletion query exceeds this limit, SQLite returns an error and no entries are deleted. Consequently, these entries remain in the database and are reprocessed and resent to the panel repeatedly during each cron job execution. Each cycle adds new activity entries, causing the volume of data sent to grow exponentially. Over time, this behavior leads to the panel's database server running out of disk space, resulting in denial of service conditions. The vulnerability can be triggered by a low-privileged user without authentication or user interaction, increasing its risk. The issue was addressed and fixed in Wings version 1.12.0 by properly handling the SQLite parameter limit during deletion operations. No known exploits are reported in the wild as of the publication date. The CVSS 4.0 score is 8.3 (high severity) reflecting network attack vector, low complexity, no privileges or user interaction required, and high impact on availability.
Potential Impact
For European organizations using Pterodactyl Wings versions between 1.7.0 and 1.12.0, this vulnerability poses a significant risk of denial of service due to disk space exhaustion on the panel's database server. This can disrupt game server management operations, impacting service availability and potentially causing downtime for hosted game servers. The repeated flooding of activity logs can also degrade performance and increase operational overhead. Since the vulnerability can be exploited by low-privileged users without authentication, insider threats or compromised accounts could trigger the attack. This risk is particularly relevant for gaming companies, hosting providers, and esports organizations relying on Pterodactyl for server orchestration. The impact extends to any dependent services or customers relying on the availability of these game servers. Additionally, recovery from disk exhaustion may require manual intervention and data cleanup, increasing operational costs and downtime.
Mitigation Recommendations
The primary mitigation is to upgrade all affected Wings installations to version 1.12.0 or later, where the issue is fixed. Until upgrades can be applied, organizations should implement monitoring of disk space usage on the panel's database server to detect abnormal growth early. Rate limiting or restricting activity log generation by low-privileged users can reduce the risk of exploitation. Applying network segmentation and access controls to limit which users can interact with Wings can also help. Regularly backing up the database and logs ensures recovery options in case of disk exhaustion. Administrators should audit user permissions to minimize the number of users capable of generating excessive activity logs. Finally, reviewing and tuning cron job frequency may reduce the impact of repeated processing cycles.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-02T18:45:27.397Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696e879b4623b1157cadb4ca
Added to database: 1/19/2026, 7:35:55 PM
Last enriched: 1/26/2026, 8:00:41 PM
Last updated: 2/7/2026, 12:42:40 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.