Urgent SolarWinds Web Help Desk Patch Fixes Critical RCE Flaws

▼ Summary
– SolarWinds has patched six critical and high-severity vulnerabilities in its Web Help Desk (WHD) software and urges customers to upgrade to version 2026.1 immediately.
– The vulnerabilities, discovered by researchers from Horizon3.ai and watchTowr, include security bypass flaws, hardcoded credentials, and untrusted data deserialization issues.
– The most severe vulnerability (CVE-2025-40551) could allow unauthenticated attackers to execute remote code on the host machine, often an on-premise server.
– While there is no current evidence of active exploitation, the situation may change, as past WHD flaws were leveraged by attackers soon after disclosure.
– The vulnerabilities affect WHD versions 12.8.8 Hotfix 1 and below, which is a widely used IT help desk solution for organizations globally.
SolarWinds has released an urgent patch for its widely used Web Help Desk software, addressing multiple critical security flaws that could allow attackers to take control of affected systems. The company is strongly advising all customers to immediately upgrade to version 2026.1 to mitigate the risk of potential remote code execution and other severe attacks. This proactive update is crucial for organizations relying on this IT support and asset management platform to maintain their security posture.
The vulnerabilities were identified by security researchers Jimi Sebree of Horizon3.ai and Piotr Bazydlo from watchTowr. Sebree discovered three issues: a security control bypass flaw (CVE-2025-40536), a problem involving hardcoded static credentials (CVE-2025-40537), and a serious untrusted data deserialization vulnerability (CVE-2025-40551). The first two could enable unauthorized users to access restricted or administrative functions. The deserialization flaw, however, poses a far greater threat, as it could permit remote code execution, allowing attackers to run arbitrary commands directly on the host server. It is important to note that Web Help Desk is frequently deployed on internal company networks, amplifying the potential impact of a successful breach.
Following the patch release, Sebree provided technical insights into these weaknesses. He outlined potential exploitation methods and listed key indicators of compromise that administrators should watch for in their system logs following any suspicious activity.
Concurrently, Bazydlo uncovered two authentication bypass flaws (CVE-2025-40552 and CVE-2025-40554) and an additional untrusted data deserialization issue (CVE-2025-40553). SolarWinds has classified all three of these vulnerabilities as critical, underscoring the severity of the security update.
These security holes impact SolarWinds Web Help Desk versions 12.8.8 Hotfix 1 and all earlier releases. The fixes are exclusively available in the newly released version 2026.1. At this time, there is no evidence that these specific flaws are being actively exploited in the wild. However, security experts warn that this window of safety may be short-lived, given the attractive target the software presents.
Web Help Desk is a popular IT service management solution employed by a global base of organizations, including small and medium-sized businesses and managed service providers. Its widespread use makes it a lucrative target for threat actors. This incident echoes a pattern from the previous year, when SolarWinds addressed two other vulnerabilities (CVE-2024-28986 and CVE-2024-28987) that were weaponized by attackers within a remarkably short time after public disclosure. The history of rapid exploitation highlights the critical importance of applying this latest patch without delay to protect network infrastructure.
(Source: HelpNet Security)





