SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
https://www.helpnetsecurity.com/2025/09/24/solarwinds-web-help-desk-rce-cve-2025-26399/
https://www.theregister.com/2025/09/23/solarwinds_patches_rce/
https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/
https://thehackernews.com/2025/09/solarwinds-releases-hotfix-for-critical.html
Published: 2025-09-23
Updated: 2025-09-24
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.00164
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored