CVE-2025-40547
BaseFortify
Publication date: 2025-11-18
Last updated on: 2025-12-02
Assigner: SolarWinds
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| solarwinds | serv-u | to 15.5.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a logic error in Serv-U that allows a malicious actor who already has administrative privileges to execute arbitrary code. It requires admin access to exploit.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to complete compromise of the affected system, including unauthorized code execution, which can result in data loss, system disruption, or further attacks. However, exploitation requires administrative privileges, and on Windows systems the risk is somewhat reduced because services often run under less-privileged accounts.