BusinessCybersecurityNewswireTechnology

SolarWinds Patches Critical RCE Flaw in Web Help Desk

▼ Summary

– SolarWinds has patched CVE-2025-26399, an unauthenticated remote code execution vulnerability in its Web Help Desk solution.
– The vulnerability stems from improper data validation in the AjaxProxy class, allowing untrusted data deserialization.
– Exploitation could allow attackers to run arbitrary code and potentially access sensitive information from vulnerable systems.
– This flaw is a patch bypass for a previous vulnerability (CVE-2024-28988) that was ultimately exploited in the wild.
– While no public exploit currently exists, researchers warn that in-the-wild exploitation is highly likely based on SolarWinds’ history.

SolarWinds has released a critical security update to address a newly discovered unauthenticated remote code execution vulnerability, identified as CVE-2025-26399, within its Web Help Desk software. This widely used IT ticketing and asset management platform requires immediate patching to prevent potential system compromise. Although there are no current reports of active exploitation, security experts warn that threat actors could quickly develop an exploit by reverse-engineering the provided hotfix.

The flaw resides in the AjaxProxy class, where inadequate validation of user-supplied data enables the deserialization of untrusted information. This weakness allows remote attackers to run arbitrary code on affected installations without needing any form of authentication. A successfully exploited system could expose highly sensitive organizational data, given the central role Web Help Desk plays in IT operations.

This specific vulnerability impacts SolarWinds Web Help Desk version 12.8.7. The company has issued a corrective update in version 12.8.7 Hotfix 1 to resolve the issue. The situation carries significant urgency because CVE-2025-26399 represents a patch bypass for a previous vulnerability, CVE-2024-28988, which itself was a bypass for an earlier flaw, CVE-2024-28986. That original vulnerability saw in-the-wild attacks shortly after a patch was made available, setting a concerning precedent.

On a positive note, a public proof-of-concept exploit for this latest flaw is not yet available. This provides a crucial window of opportunity for administrators to apply the update before attackers can weaponize the vulnerability. Prompt action is strongly recommended to secure IT infrastructure against this serious threat.

(Source: HelpNet Security)

Topics

vulnerability disclosure 95% remote code execution 90% solarwinds whd 88% patch bypass 85% exploit potential 82% unauthenticated access 80% data deserialization 78% sensitive information exposure 75% hotfix availability 73% cve identifier 70%