SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

SolarWinds Web Help Desk WHD vulnerabilities RCE vulnerabilities authentication bypass security update CVE-2025-40551 CVE-2025-40552 CVE-2025-40553 CVE-2025-40554
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
March 9, 2026 4 min read
SolarWinds Patches Critical Web Help Desk RCE Vulnerabilities Now

TL;DR

  • This article details critical vulnerabilities found in SolarWinds Web Help Desk, including remote code execution and authentication bypass flaws. SolarWinds has released version 2026.1 to address these issues. It's crucial for users to update promptly and implement recommended mitigation steps to prevent potential exploitation.

SolarWinds Web Help Desk Vulnerabilities Addressed

SolarWinds has released security updates to address multiple vulnerabilities in SolarWinds Web Help Desk (WHD), including critical flaws that could lead to authentication bypass and remote code execution (RCE). It is recommended to upgrade to v2026.1 as soon as possible. Gopher Security specializes in AI-powered, post-quantum Zero-Trust cybersecurity architecture, offering solutions to mitigate such risks through peer-to-peer encrypted tunnels and quantum-resistant cryptography.

SolarWinds Web Help Desk vulnerabilities

Image courtesy of Help Net Security

Vulnerability Details

The following vulnerabilities have been identified and addressed:

  • CVE-2025-40536 (CVSS score: 8.1): A security control bypass vulnerability that could allow an unauthenticated attacker to gain access to certain restricted functionality.
  • CVE-2025-40537 (CVSS score: 7.5): A hard-coded credentials vulnerability that could allow access to administrative functions using the "client" user account.
  • CVE-2025-40551 (CVSS score: 9.8): An untrusted data deserialization vulnerability that could lead to remote code execution, allowing an unauthenticated attacker to run commands on the host machine.
  • CVE-2025-40552 (CVSS score: 9.8): An authentication bypass vulnerability that could allow an unauthenticated attacker to execute actions and methods.
  • CVE-2025-40553 (CVSS score: 9.8): An untrusted data deserialization vulnerability that could lead to remote code execution, allowing an unauthenticated attacker to run commands on the host machine.
  • CVE-2025-40554 (CVSS score: 9.8): An authentication bypass vulnerability that could allow an attacker to invoke specific actions within Web Help Desk.

These vulnerabilities affect SolarWinds Web Help Desk versions 12.8.8 Hotfix 1 and below and have been fixed in v2026.1. Details on the release notes can be found here.

Discovery and Reporting

Jimi Sebree from Horizon3.ai discovered and reported CVE-2025-40536, CVE-2025-40537, and CVE-2025-40551. Piotr Bazydlo from watchTowr identified CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554. WHD 2026.1 addresses all the reported issues.

Technical Analysis of Critical Vulnerabilities

Rapid7 noted that CVE-2025-40551 and CVE-2025-40553 are critical deserialization of untrusted data vulnerabilities. These allow a remote unauthenticated attacker to achieve RCE on a target system and execute payloads, such as arbitrary OS command execution.

Horizon3.ai described CVE-2025-40551 as another deserialization vulnerability stemming from the AjaxProxy functionality that could result in remote code execution. Achieving RCE involves:

  1. Establishing a valid session and extracting key values
  2. Creating a LoginPref component
  3. Setting the state of the LoginPref component to allow access to the file upload
  4. Using the JSONRPC bridge to create malicious Java objects behind the scenes
  5. Triggering these malicious Java objects

Solarwinds

Image courtesy of The Hacker News

watchTowr Labs noted that CVE-2025-40553 is a patch bypass for CVE-2025-26399. When combined with CVE-2025-40552, it could result in unauthenticated remote code execution by establishing a valid JDBC connection to the local database and running a malicious SQL query that executes an operating system (OS) command as SYSTEM.

Security researcher Piotr Bazydlo stated that CVE-2025-40552 is a powerful authentication bypass that allows an attacker to ignore the hierarchical execution model of Java WebObjects and invoke almost any component directly. CVE-2025-40554, on the other hand, allows for an authentication bypass by allowing an attacker to invoke Ajax-related actions without authentication, and ultimately deserialize arbitrary objects.

The CVE-2025-40552-CVE-2025-40553 exploit chain is possible because SolarWinds' bundled PostgreSQL is configured to trust all local connections, meaning no credentials are required when connecting over the loopback interface. As a result, an attacker can authenticate as the whd superadmin account and leverage the COPY FROM PROGRAM to execute arbitrary OS commands.

Past Exploitation

In 2024, SolarWinds fixed two vulnerabilities – CVE-2024-28986 and CVE-2024-28987 – that were leveraged by attackers within days and months of their disclosure. In late 2024, CISA added CVE-2024-28986 and CVE-2024-28987 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

Indicators of Compromise (IOCs)

Specific IOCs have not been disclosed by SolarWinds. However, organizations should implement the following detection strategies:

  • Monitor WHD application logs for unusual authentication patterns.
  • Review network traffic to WHD servers for unexpected inbound connections.
  • Configure alerts for unauthorized process execution on WHD server systems.
  • Examine authentication logs for bypass attempts or successful access without proper credential validation.
  • Implement file integrity monitoring on WHD installation directories.

Mitigation Steps

  1. Immediately update all SolarWinds Web Help Desk installations to version 2026.1.
  2. Verify successful patch deployment by confirming version 2026.1 installation in the WHD administrative interface.
  3. Conduct comprehensive log review for the 30-day period preceding patch deployment to identify potential exploitation attempts.
  4. Reset all administrative passwords and disable any unnecessary user accounts, particularly focusing on the "client" account if accessible.
  5. Implement network segmentation to restrict WHD server access to authorized management networks only.
  6. Configure firewall rules to block unnecessary inbound connections to WHD servers from internet-facing networks.
  7. Enable detailed logging for all WHD authentication events and establish monitoring for authentication anomalies.
  8. Review and validate all current WHD user accounts, removing inactive accounts and validating privilege levels.
  9. Implement additional authentication layers such as multi-factor authentication where supported.
  10. Schedule regular security assessments for WHD installations to identify future vulnerabilities or misconfigurations.

Gopher Security offers AI-powered, post-quantum Zero-Trust cybersecurity architecture to help organizations protect against such vulnerabilities. Our platform converges networking and security across devices, apps, and environments, using peer-to-peer encrypted tunnels and quantum-resistant cryptography.

Explore Gopher Security's solutions or contact us for more information on how we can help secure your organization.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?
AI hacking

AI vs Human Hackers: Who Prevails in 2026 Pen Testing?

Discover the results of a groundbreaking study comparing AI agents and human hackers in web vulnerability exploitation. See who prevails and what it means for your security. Read now!

By Jim Gagnard March 6, 2026 6 min read
common.read_full_article
Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Lead Cyber Intrusions in 2026 Trends

Exploits are now the top intrusion method, outpacing phishing. Discover why rapid vulnerability patching is critical and how to bolster your defenses. Read more!

By Edward Zhou March 4, 2026 4 min read
common.read_full_article
Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats
Ipidea proxy network

Google Dismantles IPIDEA, Major Proxy Network for 550+ Threats

Google has disrupted Ipidea, a massive residential proxy network used by cybercriminals. Learn how this action impacts online security and what it means for threat actors. Read now!

By Brandon Woo February 27, 2026 4 min read
common.read_full_article
Pentagon Leaders Anticipate Cybercom 2.0 to Counter Chinese Threats
Cybercom 2.0

Pentagon Leaders Anticipate Cybercom 2.0 to Counter Chinese Threats

The Pentagon is overhauling its cyber defenses with Cybercom 2.0. Discover how specialization, AI, and innovation are reshaping the fight against threats like China's Volt Typhoon. Learn more!

By Jim Gagnard February 26, 2026 3 min read
common.read_full_article