PT-2025-39120 · Solarwinds · Solarwinds Web Help Desk
Published
2025-09-17
·
Updated
2026-02-10
·
CVE-2025-26399
CVSS v2.0
10
10
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
SolarWinds Web Help Desk versions ≤ 12.8.3
SolarWinds Web Help Desk versions prior to 12.8.4
Description
SolarWinds Web Help Desk is susceptible to an unauthenticated remote code execution (RCE) vulnerability (CVE-2025-26399). This flaw stems from a deserialization issue within the
AjaxProxy component, allowing attackers to execute arbitrary commands on the system without authentication. This vulnerability has been actively exploited in the wild. The vulnerability bypasses previous patches, representing the third attempt to address the issue. Attackers can send crafted POST requests to the AjaxProxy endpoint, deliver malicious serialized payloads, and execute commands with elevated privileges. Approximately 31,800 instances are exposed on ZoomEye.Recommendations
SolarWinds Web Help Desk versions ≤ 12.8.3: Upgrade to version 12.8.7 Hotfix 1 or 2026.1 immediately.
SolarWinds Web Help Desk versions prior to 12.8.4: Upgrade to version 12.8.4 or later.
Disable internet-facing access to the Web Help Desk and restrict access to VPN or internal networks.
Audit systems for deserialization errors, unexpected process execution from the WHD service account, and unusual outbound connections.
Fix
RCE
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-11514
CVE-2025-26399
ZDI-25-906
Affected Products
Solarwinds Web Help Desk
References · 112
- https://microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk · Vendor Advisory
- https://zerodayinitiative.com/advisories/ZDI-25-906 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-26399 · Security Note
- https://bdu.fstec.ru/vul/2025-11514 · Security Note
- https://solarwinds.com/trust-center/security-advisories/CVE-2025-26399 · Vendor Advisory
- https://twitter.com/omvapt/status/1970972272300085729 · Twitter Post
- https://twitter.com/zoomeye_team/status/1970434713941877170 · Twitter Post
- https://twitter.com/AWNetworks/status/1971253373954335108 · Twitter Post
- https://twitter.com/SecurityAid/status/1970493856819851602 · Twitter Post
- https://twitter.com/securityRSS/status/1970602380577095731 · Twitter Post
- https://twitter.com/transilienceai/status/1977252941519110241 · Twitter Post
- https://twitter.com/TheCyberSecHub/status/1970472112319254796 · Twitter Post
- https://twitter.com/RussianPanda9xx/status/2020617469572882713 · Twitter Post
- https://twitter.com/TheZDIBugs/status/1970894680125571582 · Twitter Post
- https://twitter.com/cyashadotcom/status/1970732867081941501 · Twitter Post