CVE-2025-26399
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-23

Last updated on: 2026-03-10

Assigner: SolarWinds

Description
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-23
Last Modified
2026-03-10
Generated
2026-05-07
AI Q&A
2025-09-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
solarwinds web_help_desk to 12.8.6 (inc)
solarwinds web_help_desk 12.8.7
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-26399 is a critical unauthenticated remote code execution vulnerability in SolarWinds Web Help Desk caused by insecure deserialization in the AjaxProxy component. This flaw allows an attacker to execute arbitrary commands on the host machine without needing to authenticate, effectively giving them control over the affected system. It is a patch bypass of previous vulnerabilities CVE-2024-28988 and CVE-2024-28986. [1]


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows an attacker to remotely execute arbitrary commands on the host machine without authentication. This could lead to full system compromise, data theft, disruption of services, or further attacks within the network. Given its critical severity and high CVSS score of 9.8, exploitation could result in significant operational and security risks. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate CVE-2025-26399, immediately install the SolarWinds Web Help Desk 12.8.7 Hotfix 1 released on September 23, 2025. The mitigation steps include: 1) Stop the Web Help Desk service; 2) Backup and delete the c3p0.jar file from the WEB-INF/lib directory; 3) Backup the existing whd-core.jar, whd-web.jar, and whd-persistence.jar files; 4) Copy the updated JAR files from the hotfix package into the WEB-INF/lib directory, including the new HikariCP.jar file; 5) Restart the Web Help Desk service. Note that the hotfix requires the base version 12.8.7 of Web Help Desk to be installed. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart