CVE-2025-26399
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
Analysis
SolarWinds Web Help Desk contains an unauthenticated deserialization RCE via AjaxProxy, a patch bypass of both CVE-2024-28988 and CVE-2024-28986, the third iteration of this vulnerability.
Technical Context
The CWE-502 deserialization in AjaxProxy processes untrusted data without proper class filtering. This is a double patch bypass, indicating the remediation approach was fundamentally insufficient.
Affected Products
['SolarWinds Web Help Desk']
Remediation
Apply the latest SolarWinds patches. Consider the pattern of repeated bypasses when evaluating continued use of the product.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today