CVE-2025-68954
Unknown Unknown - Not Provided
Persistent SFTP Access Vulnerability in Pterodactyl

Publication date: 2026-01-06

Last updated on: 2026-01-06

Assigner: GitHub, Inc.

Description
Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below do not revoke active SFTP connections when a user is removed from a server instance or has their permissions changes with respect to file access over SFTP. This allows a user that was already connected to SFTP to remain connected and access files even after their permissions are revoked. A user must have been connected to SFTP at the time of their permissions being revoked in order for this vulnerability to be exploited. This issue is fixed in version 1.12.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-06
Last Modified
2026-01-06
Generated
2026-05-07
AI Q&A
2026-01-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
pterodactyl panel 1.12.0
pterodactyl wings 1.12.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-613 According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-68954 is a vulnerability in the Pterodactyl game server management panel and its Wings SFTP subsystem where active SFTP connections are not revoked when a user is removed from a server or their permissions are changed. This means that if a user is connected via SFTP at the time their permissions are revoked, they can continue to access files on the server despite no longer having permission. The issue arises because permissions are only checked once during the initial authentication handshake, and not revalidated during the session. This vulnerability affects versions 1.11.11 and below and is fixed in version 1.12.0. [3, 2]


How can this vulnerability impact me? :

This vulnerability can allow a user who had legitimate access to a server via SFTP to continue accessing files even after their permissions have been revoked or they have been removed from the server. This unauthorized persistent access could lead to exposure or modification of sensitive files on the server. The attacker must have been connected at the time their permissions were revoked to exploit this. It poses a high impact on confidentiality, integrity, and availability of the affected system's files accessible via SFTP. [3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring active SFTP connections on the Wings daemon to identify users who remain connected after their permissions have been revoked or they have been removed as subusers. Since the vulnerability involves active SFTP sessions not being revoked, you can check for persistent SFTP connections from users who should no longer have access. Commands to list active SFTP connections depend on the server environment but generally include commands like `sshd` or `netstat` to identify open SFTP sessions. For example, on the server running Wings, you can use `netstat -tnp | grep sshd` or `ss -tnp | grep sshd` to list active SSH/SFTP connections. Additionally, reviewing Wings logs or using the Wings API endpoint `/api/deauthorize-user` (as introduced in the fix) can help verify if users are properly deauthorized. However, no specific detection commands are provided in the resources. [3, 2]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade the Pterodactyl Panel and Wings to version 1.12.0 or later, where this vulnerability is fixed. The update introduces a mechanism that forcibly disconnects active SFTP and WebSocket sessions when a user's permissions are revoked or when they are removed as subusers, preventing unauthorized persistent access. Until the upgrade is applied, a temporary workaround is to manually restart the Wings daemon to terminate active SFTP connections for users whose permissions have changed. This will force disconnection of lingering sessions. Additionally, reviewing user permissions and ensuring no unauthorized active connections remain is recommended. [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows users who have had their permissions revoked to maintain active SFTP connections and access files, potentially leading to unauthorized access to sensitive data. Such unauthorized persistent access could violate compliance requirements in standards like GDPR and HIPAA, which mandate strict access controls and timely revocation of user permissions to protect personal and sensitive information. Therefore, failure to revoke active sessions promptly may result in non-compliance with these regulations. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart