CVE-2025-26391

5.4 MEDIUM

📋 TL;DR

SolarWinds Observability Self-Hosted contains a cross-site scripting (XSS) vulnerability in user-created URL fields that allows authenticated low-privilege users to inject malicious scripts. When exploited, this could enable attackers to steal session cookies, perform actions as other users, or deface the application. Organizations running affected SolarWinds self-hosted deployments are vulnerable.

💻 Affected Systems

Products:
  • SolarWinds Observability Self-Hosted
  • SolarWinds Platform
Versions: Versions prior to 2025.4.1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authentication with low-level account privileges. Self-hosted deployments only (not SaaS).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator session cookies, gain full administrative access to the SolarWinds platform, pivot to other systems, and potentially compromise the entire monitoring infrastructure.

🟠

Likely Case

Low-privilege authenticated users could steal session cookies from other users, perform unauthorized actions within the application, or redirect users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payloads would be neutralized, preventing script execution while maintaining URL functionality.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with any user account. The vulnerability is in user-controlled URL fields where malicious JavaScript can be injected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.4.1

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26391

Restart Required: Yes

Instructions:

1. Download SolarWinds Platform 2025.4.1 from the SolarWinds customer portal. 2. Backup your current installation and database. 3. Run the installer with administrative privileges. 4. Follow the upgrade wizard. 5. Restart SolarWinds services after completion.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on URL fields to reject or sanitize JavaScript content

Content Security Policy

all

Implement strict Content Security Policy headers to mitigate XSS impact

🧯 If You Can't Patch

  • Restrict user permissions to minimize who can create/modify URL fields
  • Implement web application firewall rules to detect and block XSS payloads in URL parameters

🔍 How to Verify

Check if Vulnerable:

Check SolarWinds Platform version in the web interface under Help > About. If version is earlier than 2025.4.1, the system is vulnerable.

Check Version:

In SolarWinds web interface: Navigate to Help > About to view version information

Verify Fix Applied:

After patching, verify the version shows 2025.4.1 or later. Test URL fields by attempting to inject basic XSS payloads like <script>alert('test')</script> and confirm they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameter values containing script tags or JavaScript code
  • Multiple failed XSS attempts in web server logs
  • Suspicious user activity from low-privilege accounts

Network Indicators:

  • HTTP requests with suspicious parameters containing script tags or JavaScript
  • Unusual outbound connections from SolarWinds server following user interactions

SIEM Query:

source="solarwinds_web_logs" AND (url="*<script>*" OR url="*javascript:*" OR param="*onerror=*" OR param="*onload=*")

🔗 References

📤 Share & Export