CVE-2025-26399 (CVSS 9.8): SolarWinds Web Help Desk Hit by Critical RCE Vulnerability

CVE-2025-26399 (CVSS 9.8): SolarWinds Web Help Desk Hit by Critical RCE Vulnerability

CVE-2024-28991 & CVE-2024-28990 SolarWinds RCE vulnerability CVE-2025-26399

SolarWinds has released a hotfix for its Web Help Desk (WHD) software after the discovery of a critical remote code execution (RCE) vulnerability tracked as CVE-2025-26399. The flaw, rated CVSS 9.8, stems from an unauthenticated AjaxProxy deserialization issue and has been identified as a patch bypass of earlier vulnerabilities (CVE-2024-28988 and CVE-2024-28986).

According to the advisory, “SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine.”

The report highlights that this flaw continues a worrying trend of patch bypasses:

  • CVE-2024-28986 → Original deserialization flaw.
  • CVE-2024-28988 → First patch bypass.
  • CVE-2025-26399 → Second patch bypass, now addressed in this hotfix.

The vulnerability was responsibly disclosed by an anonymous researcher working with Trend Micro’s Zero Day Initiative (ZDI).

Because the flaw is unauthenticated, attackers can exploit it without needing valid credentials. Successful exploitation would allow adversaries to execute arbitrary commands on the underlying server — a full system compromise risk.

This makes CVE-2025-26399 particularly dangerous for organizations that expose Web Help Desk instances to the internet without proper segmentation or additional layers of defense.

The hotfix is available for Web Help Desk 12.8.7 and provides updated libraries to mitigate the vulnerability. Specifically, it:

  • Adds HikariCP.jar
  • Modifies whd-core.jar, whd-web.jar, and whd-persistence.jar within the /lib directory.

Administrators are required to:

  1. Stop Web Help Desk.
  2. Remove the outdated c3p0.jar.
  3. Back up and replace the affected JAR files with those from the hotfix.
  4. Restart Web Help Desk to apply the patch.

Previous Article

BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells

Next Article

Jaguar Land Rover Extends Production Pause Again