Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8w7m-w749-rx98

Опубликовано: 20 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 8.3
CVSS3: 6.5

Описание

Pterodactyl websocket endpoints have no visible rate limits or monitoring, allowing for DOS attacks

Summary

Websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu.

Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings.

Пакеты

Наименование

github.com/pterodactyl/wings

go
Затронутые версииВерсия исправления

< 1.12.0

1.12.0

EPSS

Процентиль: 14%
0.00047
Низкий

8.3 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-400
CWE-770

Связанные уязвимости

CVSS3: 6.5
nvd
19 дней назад

Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.

EPSS

Процентиль: 14%
0.00047
Низкий

8.3 High

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-400
CWE-770