CVE-2025-69199: Pterodactyl websocket endpoints have no visible rate limits or monitoring, allowing for DOS attacks
(updated )
Websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu.
Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings.
References
- github.com/advisories/GHSA-8w7m-w749-rx98
- github.com/pterodactyl/panel
- github.com/pterodactyl/panel/commit/09caa0d4995bd924b53b9a9e9b4883ac27bd5607
- github.com/pterodactyl/panel/releases/tag/v1.12.0
- github.com/pterodactyl/panel/security/advisories/GHSA-8w7m-w749-rx98
- nvd.nist.gov/vuln/detail/CVE-2025-69199
Code Behaviors & Features
Detect and mitigate CVE-2025-69199 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →