SolarWinds has released security updates to address six vulnerabilities in its Web Help Desk (WHD) IT service management software, including four rated critical that could allow unauthenticated attackers to achieve remote code execution with SYSTEM privileges. CISA has confirmed active exploitation and added CVE-2025-40551 to the Known Exploited Vulnerabilities catalog.

Vulnerability summary

CVECVSSSeverityTypeAuthentication
CVE-2025-405519.8CriticalDeserialization RCENone required
CVE-2025-405539.8CriticalDeserialization RCENone required
CVE-2025-405529.8CriticalAuthentication bypassNone required
CVE-2025-405549.8CriticalAuthentication bypassNone required
CVE-2025-405367.5HighAccess control bypassNone required
CVE-2025-405377.2HighHardcoded credentialsSpecific conditions

All four critical vulnerabilities share the same CVSS 9.8 score and allow remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

CISA KEV addition

AttributeDetails
KEV addition dateFebruary 4, 2026
Active exploitationConfirmed
Federal agency deadlineFebruary 6, 2026 (CVE-2025-40551)
Additional CVEs deadlineFebruary 24, 2026
Binding directiveBOD 22-01

CISA stated: “SolarWinds Web Help Desk contains a deserialization of untrusted data vulnerability that could lead to remote code execution, which would allow an attacker to run commands on the host machine. This could be exploited without authentication.”

Timeline

DateEvent
January 2026Horizon3.ai discovers CVE-2025-40551
January 29, 2026SolarWinds releases WHD version 2026.1
February 4, 2026CISA adds CVE-2025-40551 to KEV
February 6, 2026Federal agency remediation deadline (CVE-2025-40551)
February 24, 2026Federal deadline for remaining CVEs

Critical vulnerabilities in detail

CVE-2025-40551 & CVE-2025-40553: Deserialization RCE

Both vulnerabilities stem from deserialization of untrusted data in the WHD application. The flaws exist in the AjaxProxy component, which handles asynchronous requests.

AttributeCVE-2025-40551CVE-2025-40553
CVSS9.89.8
ComponentAjaxProxyAjaxProxy
Root causeDeserialization of untrusted dataDeserialization of untrusted data
AuthenticationNone requiredNone required
ExploitationIn the wildNot yet confirmed

Attack vector:

StepAction
1Attacker sends crafted serialized object to vulnerable endpoint
2Application deserializes without validation
3Malicious object triggers code execution
4Attacker gains SYSTEM-level access

According to Horizon3.ai researcher Jimi Sebree, CVE-2025-40551 exists in AjaxProxy functionality due to improper sanitization of requests and the bypass of a blocklist function.

No authentication required. Any network-accessible WHD instance is vulnerable.

CVE-2025-40552 & CVE-2025-40554: Authentication bypass

These vulnerabilities allow attackers to bypass authentication mechanisms entirely, gaining access equivalent to authenticated users—including administrators.

AttributeCVE-2025-40552CVE-2025-40554
CVSS9.89.8
TypeAuthentication bypassAuthentication bypass
ImpactAdministrative accessAdministrative access
AuthenticationNone requiredNone required

Combined impact: With both deserialization and auth bypass, attackers can:

CapabilityRisk
Execute arbitrary codeSYSTEM privileges
Install programsPersistence
Create accountsBackdoor access
Access all dataComplete compromise
Lateral movementNetwork pivot point

High-severity vulnerabilities

CVE-2025-40536: Access control bypass

AttributeDetails
CVSS7.5
TypeAccess control bypass
ImpactAccess restricted functionality
AuthenticationNone required

Allows unauthenticated attackers to reach functionality that should be restricted to authenticated users. While not directly enabling RCE, it expands the attack surface significantly.

CVE-2025-40537: Hardcoded credentials

AttributeDetails
CVSS7.2
TypeHardcoded credentials
ImpactAdministrative access
ConditionsSpecific deployment configurations

Under specific conditions, hardcoded credentials in the application can grant access to administrative functionality.

Affected versions

ProductAffected versionsFixed version
SolarWinds Web Help Desk12.8.8 HF1 and all prior2026.1

Patch bypass history

CVE-2025-40551 is the latest in a series of bugs centered around bypasses of fixes to CVE-2024-28986:

DateCVEIssueStatus
August 2024CVE-2024-28986Java deserialization RCEPatched, then bypassed
August 2024CVE-2024-28987Hardcoded credential accessCISA KEV
September 2025CVE-2025-26399Patch bypass for CVE-2024-28986Patched, then bypassed
January 2026CVE-2025-40551Latest patch bypassCurrent

This pattern suggests structural issues in the WHD codebase that require comprehensive remediation rather than point fixes.

Impact assessment

SolarWinds Web Help Desk serves over 300,000 organizations globally for IT service management, including:

FunctionDescription
IT support ticketingInternal helpdesk operations
Asset managementHardware/software inventory
Change managementIT change tracking
SLA trackingService level monitoring
Knowledge baseInternal documentation

Data at risk

WHD instances typically have access to:

Data categoryExamplesRisk
IT infrastructureAsset inventory, network documentationReconnaissance
User dataEmployee information, credential reset requestsPII exposure
Business processesIncident history, change recordsOperational insight
Internal communicationsSupport tickets, knowledge articlesConfidential info
Integration credentialsConnected system accessLateral movement

Compromise provides attackers with detailed intelligence about the target’s IT environment and potential pivot points for lateral movement.

Exploitation in the wild

CISA’s KEV addition confirms active exploitation:

FactorAssessment
Functional exploitsExist and used in real environments
Attack complexityLow (no authentication required)
Target valueHigh (IT infrastructure visibility)
ExposureInternet-facing and internal deployments

High-risk deployments

Deployment typeRisk level
Internet-facing WHDCritical
Internal with weak segmentationHigh
Integrated with ADHigh (credential pivot)
Containing sensitive ticketsHigh

Patching guidance

Immediate action required

StepAction
1Download Web Help Desk version 2026.1 from SolarWinds Customer Portal
2Review release notes for upgrade prerequisites
3Back up current WHD database and configuration
4Deploy update during maintenance window
5Verify successful installation
6Review access logs for indicators of prior compromise

If immediate patching is not possible

MitigationPurpose
Network isolationRestrict access to WHD instances
Firewall rulesBlock external access
VPN-only accessRequire VPN for remote users
Enhanced loggingDetect exploitation attempts
WAF rulesBlock serialized object payloads
Consider offlineTake WHD offline until patched

Detection

Indicators to monitor

IndicatorMeaning
Unusual requests to AjaxProxy endpointsPossible exploitation
Serialized Java objects in HTTP bodiesAttack payload
New user accountsPost-exploitation activity
Privilege escalationsAttacker persistence
Unexpected outbound connectionsC2 communication
SYSTEM-level processes from WHDCode execution

Log sources

Log sourceWhat to review
WHD application logsAjaxProxy requests, errors
Web server access logsSuspicious POST requests
Windows Security logsProcess creation (4688), account management
Network traffic logsUnusual WHD connections
Authentication logsFailed/successful logins

Detection rules

PlatformRule focus
SIEMAjaxProxy POST with serialized content
EDRWHD spawning unexpected child processes
WAFJava serialization patterns in requests
NetworkOutbound connections from WHD server

Recommendations

For WHD administrators

PriorityAction
CriticalPatch immediately to version 2026.1
CriticalAudit access logs for exploitation signs
HighReview user accounts for unauthorized additions
HighRestrict network access to WHD if exposed
HighEnable MFA for administrative access
MediumReview integration credentials for abuse

For security teams

PriorityAction
CriticalInventory WHD instances across organization
CriticalPrioritize patching above normal cycles
HighHunt for compromise indicators in historical logs
HighAssess data exposure if compromised
MediumReview WHD in threat models
OngoingMonitor for new WHD vulnerabilities

For federal agencies

RequirementDeadline
CVE-2025-40551 remediationFebruary 6, 2026
Remaining CVEs remediationFebruary 24, 2026
AlternativeDiscontinue use if mitigation impossible

Context

SolarWinds products continue to be high-value targets following the 2020 supply chain compromise. While Web Help Desk is a separate product from the compromised Orion platform, the SolarWinds brand attracts attacker attention and researcher scrutiny.

FactorImplication
Brand targetingAttackers specifically seek SolarWinds vulnerabilities
Recurring WHD flawsStructural codebase issues
Patch bypass patternFixes don’t address root cause
High deployment count300,000+ organizations affected

The recurring pattern of critical WHD vulnerabilities—and the need for patch bypass fixes—suggests organizations should evaluate whether WHD’s risk profile aligns with their security requirements. The three-day federal deadline for CVE-2025-40551 underscores the severity of this vulnerability class.

Organizations unable to maintain aggressive patching cadence for WHD should consider:

OptionConsideration
Alternative ITSM platformsDifferent risk profile
Strict network isolationReduce attack surface
Enhanced monitoringDetect exploitation quickly
Managed serviceVendor-managed patching