Generated remediation guidance and an executive summary. No account required.
Wings is the server control plane for Pterodactyl, a free, open-source game server management panel. Prior to version 1.12.0, websockets within wings lack proper rate limiting and throttling. As a result a malicious user can open a large number of connections and then request data through these sockets, causing an excessive volume of data over the network and overloading the host system memory and cpu. Additionally, there is not a limit applied to the total size of messages being sent or received, allowing a malicious user to open thousands of websocket connections and then send massive volumes of information over the socket, overloading the host network, and causing increased CPU and memory load within Wings. Version 1.12.0 patches the issue.
Cite this page
CVE-2025-69199. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2025-69199
Use CWE-400, Pterodactyl vendor hub and Wings product page to widen CVE-2025-69199 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-27102, CVE-2023-25168 and CVE-2023-32080 for nearby disclosures in the same product family.