Article Details
Scrape Timestamp (UTC): 2025-09-23 13:45:35.386
Original Article Text
Click to Toggle View
SolarWinds releases third patch to fix Web Help Desk RCE bug. SolarWinds has released a hotfix for a critical a critical vulnerability in Web Help Desk that allows remote code execution (RCE) without authentication. Tracked as CVE-2025-26399, the security issue is the company's third attempt to address an older flaw identified as CVE-2024-28986 that impacted Web Help Desk (WHD) 12.8.3 and all previous versions. SolarWinds WHD is a help desk and ticketing suite used by medium-to-large organizations for IT support request tracking, workflow automation, asset management, and compliance assurance. CVE-2025-26399 affects the latest WHD version 12.8.7 and is caused by unsafe deserialization handling in the AjaxProxy component. Successful exploitation allows an unauthenticated attacker to run commands on the host machine. In a security bulletin, the vendor says that "this vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986." Last August, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) marked the original SolarWinds flaw as being leveraged in attacks and added it to the Known Exploited Vulnerabilities (KEV) catalog. The new security problem was reported to SolarWinds through the Trend Micro Zero Day Initiative (ZDI). At the time of writing there are no public reports about threat actors exploiting it. Hotfix available SolarWinds has released a hotfix that addresses CVE-2025-26399, which requires installing Web Help Desk version 12.8.7. To apply the security update, users are advised to follow these steps: The hotfix is exclusively available through the SolarWinds Customer Portal. More information on how to upgrade WHD is available here. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
SolarWinds has issued a hotfix for a critical remote code execution vulnerability in Web Help Desk, tracked as CVE-2025-26399, affecting version 12.8.7 and earlier.
The vulnerability arises from unsafe deserialization in the AjaxProxy component, allowing unauthenticated attackers to execute commands on the host machine.
This is the third patch attempt, following previous flaws CVE-2024-28986 and CVE-2024-28988, which were also exploited in attacks and listed in CISA's Known Exploited Vulnerabilities catalog.
The vulnerability was reported to SolarWinds by the Trend Micro Zero Day Initiative, although no active exploitation by threat actors has been publicly reported.
Organizations using Web Help Desk are advised to install the hotfix via the SolarWinds Customer Portal to mitigate potential security risks.
The ongoing patching efforts reflect the complexity of securing software against evolving threats and the importance of timely updates.