4
0
3
0
Vulnerability Timeline
4 vulnerabilities discovered over time for Serv-u
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-40541 | 7.2 | This vulnerability allows an attacker to run harmful code on the system as a privileged user, potentially taking full control of the Serv-U software. However, the attacker must already have administrative access to exploit this weakness, which makes it less risky on Windows systems where services typically run with lower privileges. | solarwindsserv-u | Exploit Available | about 1 month agoFeb 24, 2026 |
| CVE-2025-40540 | 7.2 | This vulnerability allows an attacker to run any code they choose with high-level permissions on the affected system. However, they need to have administrative access to exploit it, which makes it less risky on Windows systems where services often run with lower privileges by default. | solarwindsserv-u | Theoretical | about 1 month agoFeb 24, 2026 |
| CVE-2025-40539 | 7.2 | This vulnerability allows an attacker to run any code they choose with high-level privileges on the affected system. However, they need to have administrative access to exploit it, which makes it less risky on Windows systems where services often run with lower privileges by default. | solarwindsserv-u | Exploit Available | about 1 month agoFeb 24, 2026 |
| CVE-2025-40538 | 7.2 | This vulnerability allows an attacker with administrative privileges to create a system admin user and run any code they want with high-level permissions. While it poses a significant risk, it can only be exploited by someone who already has admin access to the system. | solarwindsserv-u | Exploit Available | about 1 month agoFeb 24, 2026 |
About Solarwinds Serv-u Security
This page provides comprehensive security vulnerability tracking for Solarwinds Serv-u. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Serv-u updated to the latest version
- • Subscribe to security advisories from Solarwinds
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately