Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rgmp-4873-r683 | Pterodactyl TOTPs can be reused during validity window |
Mon, 12 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:pterodactyl:panel:*:*:*:*:*:*:*:* |
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pterodactyl
Pterodactyl panel |
|
| Vendors & Products |
Pterodactyl
Pterodactyl panel |
Tue, 06 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below allow TOTP to be used multiple times during its validity window. Users with 2FA enabled are prompted to enter a token during sign-in, and afterward it is not sufficiently marked as used in the system. This allows an attacker who intercepts that token to use it in addition to a known username/password during the 60-second token validity window. The attacker must have intercepted a valid 2FA token (for example, during a screen share). This issue is fixed in version 1.12.0. | |
| Title | Pterodactyl TOTPs can be reused during validity window | |
| Weaknesses | CWE-287 CWE-294 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-06T19:01:05.967Z
Reserved: 2025-12-29T14:34:46.743Z
Link: CVE-2025-69197
Updated: 2026-01-06T14:23:39.485Z
Status : Analyzed
Published: 2026-01-06T01:16:01.537
Modified: 2026-01-12T21:26:03.643
Link: CVE-2025-69197
No data.
OpenCVE Enrichment
Updated: 2026-01-06T14:16:19Z
Github GHSA