SolarWinds Web Help Desk RCE Vulnerability CVE-2025-26399
Summary
CISA has added CVE-2025-26399, a critical remote code execution vulnerability in SolarWinds Web Help Desk, to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability affects versions 12.8.7 and below and allows unauthenticated attackers to run commands on the host machine.
What changed
CISA has added CVE-2025-26399 to its Known Exploited Vulnerabilities (KEV) catalog, indicating active exploitation of a critical remote code execution (RCE) vulnerability in SolarWinds Web Help Desk. This vulnerability, a patch bypass of previous CVEs, allows unauthenticated attackers to execute commands on the host machine. The affected versions are 12.8.7 and below.
Organizations using SolarWinds Web Help Desk must immediately review their systems for this vulnerability and apply the necessary patches or mitigations. Failure to do so could result in system compromise. The inclusion in the KEV catalog suggests that federal agencies may be required to patch this vulnerability by a specific deadline, though that deadline is not explicitly stated in this notice.
What to do next
- Review SolarWinds Web Help Desk installations for versions 12.8.7 and below.
- Apply available patches or implement mitigations for CVE-2025-26399.
- Monitor for any specific directives from CISA or other relevant authorities regarding this vulnerability.
Source document (simplified)
Required CVE Record Information
CNA: SolarWinds
Description
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CWE 1 Total
Learn more
- CWE-502: CWE-502: Deserialization of Untrusted Data
CVSS 1 Total
Learn more
| Score | Severity | Version | Vector String |
| --- | --- | --- | --- |
| 9.8 | CRITICAL | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Product Status
Learn more Versions 1 Total
Default Status: unaffected
affected
- affected at 12.8.7 and below
Credits
- Anonymous working with Trend Micro Zero Day Initiative reporter
References 2 Total
- https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26399
- https://documentation.solarwinds.com/en/successcenter/whd/content/releasenotes/whd12-8-7-hotfix-1release_notes.htm
Authorized Data Publishers
CISA-ADP
Updated:
2026-03-10
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.
SSVC 1 Total
Learn more
| Exploitation | Automatable | Technical Impact | Version | Date Accessed |
| --- | --- | --- | --- | --- |
| active | yes | total | 2.0.3 | 2025-09-23 |
KEV 1 Total
Learn more
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-26399 (2026-03-09)
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Vulnerability Management alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CISA Known Exploited Vulnerabilities (KEV) publishes new changes.