{"id":"CVE-2025-68954","summary":"Pterodactyl does not revoke SFTP access when server is deleted or permissions reduced","details":"Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below do not revoke active SFTP connections when a user is removed from a server instance or has their permissions changes with respect to file access over SFTP. This allows a user that was already connected to SFTP to remain connected and access files even after their permissions are revoked. A user must have been connected to SFTP at the time of their permissions being revoked in order for this vulnerability to be exploited. This issue is fixed in version 1.12.0.","aliases":["GHSA-8c39-xppg-479c","GO-2026-4283"],"modified":"2026-04-10T05:35:15.274724Z","published":"2026-01-06T00:31:14.662Z","related":["SUSE-SU-2026:0142-1"],"database_specific":{"cwe_ids":["CWE-613"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68954.json","cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"https://github.com/pterodactyl/panel/releases/tag/v1.12.0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68954.json"},{"type":"ADVISORY","url":"https://github.com/pterodactyl/panel/security/advisories/GHSA-8c39-xppg-479c"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-68954"},{"type":"FIX","url":"https://github.com/pterodactyl/panel/commit/2bd9d8baddb0e0606e4a9d5be402f48678ac88d5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pterodactyl/panel","events":[{"introduced":"0"},{"fixed":"09caa0d4995bd924b53b9a9e9b4883ac27bd5607"}]}],"versions":["v0.1.0-beta","v0.1.1-beta","v0.1.2-beta","v0.2.0-beta","v0.3.0-beta","v0.4.0-beta","v0.4.1-beta","v0.5.0","v1.0.0","v1.0.0-rc.1","v1.0.0-rc.3","v1.0.0-rc.4","v1.0.0-rc.5","v1.0.0-rc.6","v1.0.0-rc.7","v1.0.1","v1.0.2","v1.0.3","v1.1.0","v1.1.1","v1.1.2","v1.1.3","v1.10.0","v1.10.1","v1.10.2","v1.10.3","v1.10.4","v1.11.0","v1.11.0-rc.1","v1.11.0-rc.2","v1.11.1","v1.11.2","v1.11.3","v1.11.4","v1.11.5","v1.11.6","v1.11.7","v1.2.0","v1.2.1","v1.2.2","v1.3.0","v1.3.1","v1.3.2","v1.4.0","v1.4.1","v1.4.2","v1.5.0","v1.5.1","v1.6.0","v1.6.1","v1.6.2","v1.6.3","v1.6.5","v1.6.6","v1.7.0","v1.8.0","v1.8.1","v1.9.0","v1.9.1","v1.9.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68954.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"}]}