Categories: Cyber Security News

Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

Multiple critical vulnerabilities in SolarWinds Web Help Desk (WHD), culminating in unauthenticated remote code execution (RCE) via Java deserialization in CVE-2025-40551, were uncovered by Horizon3.ai researchers.

These flaws chain static credentials, security bypasses, and deserialization weaknesses, affecting versions prior to 2026.1.

SolarWinds WHD, an IT service management platform for ticketing and asset tracking, has faced repeated deserialization issues.

In 2024, CVE-2024-28986 enabled RCE via AjaxProxy and was added to CISA’s Known Exploited Vulnerabilities catalog; patches were bypassed by CVE-2024-28988 and CVE-2025-26399.

The latest chain exploits similar paths, bypassing sanitization in JSON-RPC handling.

Vulnerability Demo (Source: Horizon3.ai)

The flaws include hardcoded credentials, CSRF and request-filter bypasses, and unsafe deserialization in the jabsorb library.

CVE ID Description CVSS v3.1 Score Impact
CVE-2025-40551 Unauthenticated RCE via AjaxProxy deserialization 9.8 Remote command execution
CVE-2025-40537 Static “client:client” credentials enabling admin access 7.5 Unauthorized privilege escalation
CVE-2025-40536 Protection bypass via bogus “/ajax/” parameter 8.1 Access to restricted WebObjects

Attackers bypass whitelists by altering URIs from “/ajax/” to “/wo/”, create components with “wopage”, and inject gadgets like JNDI lookups.

Table of Contents

Toggle

Exploit Chain

Unauthenticated attackers start by creating a session on the login page to extract wosid and XSRF tokens.

They bypass filters with “?badparam=/ajax/&wopage=LoginPref” to instantiate LoginPref, enabling AjaxProxy access, then POST malicious JSON payloads via JSONRPC for deserialization.

Sponsored

A Nuclei template demonstrates JNDI lookup to external servers, confirming RCE potential.

Monitor logs in <Install>/logs/ for exploitation signs.

Log Type IOC Example
whd-session.log “eventType=[login], accountType=[client], username=[client]”
whd.log “Whitelisted payload with matched keyword: java..” or JSONRPC errors
Access logs Requests to “/Helpdesk.woa/wo/*” with non-whitelisted params like “badparam=/ajax/”

Unusual IPs hitting restricted endpoints signal compromise.

Mitigations

Upgrade immediately to WHD 2026.1, which addresses these issues, according to SolarWinds’ release notes. Review configurations to disable default accounts and enforce strict request filtering.

Coverage exists in tools like NodeZero; monitor CISA advisories for exploitation updates.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Prediction markets want the Oscars to be your gateway drug to betting on everything

Though it was weird to see the Golden Globes partner with Polymarket for its most…

30 minutes ago

MacBook Air M5 review: a small update for the ‘just right’ Mac

Neo to the left of me. Pros are to the right. | Photo: Antonio G.…

30 minutes ago

Zendesk to acquire Forethought AI to drive autonomous AI agents

Zendesk is to acquire Forethought AI. It says that this will be its largest acquisition…

40 minutes ago

A Scavengers Reign artist explores contemplative sci-fi in new comics

You may recognize Jonathan Djob Nkondo's work from animated projects like the surreal sci-fi series…

2 hours ago

The Best Deals Today: Mario Kart World, Astro Bot, NZXT AIO, and More

A new weekend has arrived, and today, you can save big on LEGO Star Wars,…

2 hours ago

Before Recent Attack, Michigan Synagogue Had Been Bolstering Its Security

The Michigan synagogue that came under attack this week when an armed man drove his car into…

2 hours ago

This website uses cookies.