CVE-2025-26399

Critical
|9.8
Exploit Available

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to run commands on the host machine without needing to log in, making it extremely dangerous. It takes advantage of flaws in the SolarWinds Web Help Desk software that were supposed to be fixed in previous updates, meaning that even patched systems could still be at risk.

Technical Description

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References