CVE-2025-40538

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with administrative privileges to create a system admin user and run any code they want with high-level permissions. While it poses a significant risk, it can only be exploited by someone who already has admin access to the system.

Technical Description

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,421($1K-$5K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 24, 2026

about 1 month ago

Last Modified

Feb 24, 2026

about 1 month ago

Vendor

solarwinds

Product

serv-u