CVE-2025-26399

9.8 CRITICAL

📋 TL;DR

CVE-2025-26399 is an unauthenticated remote code execution vulnerability in SolarWinds Web Help Desk's AjaxProxy component that allows attackers to execute arbitrary commands on affected systems. This affects organizations running vulnerable versions of SolarWinds Web Help Desk. This vulnerability represents a patch bypass for two previous vulnerabilities (CVE-2024-28988 and CVE-2024-28986).

💻 Affected Systems

Products:
  • SolarWinds Web Help Desk
Versions: Versions prior to 12.8.7 Hotfix 1
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. The vulnerability exists in the AjaxProxy component which is typically enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, install malware, steal data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Initial foothold leading to ransomware deployment, data exfiltration, or installation of backdoors for future attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, EDR solutions, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated RCE on internet-facing systems allows immediate compromise without any credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated RCE allows lateral movement and privilege escalation from any network position.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

As a patch bypass for previously weaponized vulnerabilities (CVE-2024-28988 and CVE-2024-28986), exploitation is likely straightforward for threat actors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.8.7 Hotfix 1

Vendor Advisory: https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26399

Restart Required: Yes

Instructions:

1. Download SolarWinds Web Help Desk 12.8.7 Hotfix 1 from SolarWinds portal. 2. Backup current installation and database. 3. Run the installer with administrative privileges. 4. Restart the Web Help Desk service. 5. Verify successful update through the admin interface.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to Web Help Desk to trusted IP addresses only

Web Application Firewall Rules

all

Block requests to AjaxProxy endpoints or monitor for deserialization attempts

🧯 If You Can't Patch

  • Isolate the Web Help Desk server in a separate network segment with strict firewall rules
  • Implement application control/whitelisting to prevent execution of unauthorized binaries

🔍 How to Verify

Check if Vulnerable:

Check Web Help Desk version in admin interface: Settings > About. If version is earlier than 12.8.7 Hotfix 1, system is vulnerable.

Check Version:

On Windows: Check registry at HKEY_LOCAL_MACHINE\SOFTWARE\SolarWinds\Web Help Desk\Version. On Linux: Check /opt/SolarWinds/WebHelpDesk/version.txt

Verify Fix Applied:

Verify version shows 12.8.7 Hotfix 1 or later in admin interface and test that AjaxProxy functionality still works for legitimate users.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /AjaxProxy endpoints
  • Deserialization errors in application logs
  • Suspicious process creation from Web Help Desk service

Network Indicators:

  • Unusual outbound connections from Web Help Desk server
  • Traffic to known malicious IPs or domains

SIEM Query:

source="web_help_desk" AND (uri_path="/AjaxProxy/*" AND status_code=200 AND bytes_out>100000) OR process_name="cmd.exe" OR process_name="powershell.exe" parent_process="java.exe"

🔗 References

📤 Share & Export