SARA / Free Tools / CVE / CVE-2025-26399

CVE-2025-26399 — SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which

CVSS
9.8 CRITICAL
EPSS
28.76% (top 3.50%)
CWE
CWE-502
Published
2025-09-23T05:07:14.702Z
Last modified
2026-03-10T03:55:22.393Z
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA KEV — Actively Exploited
Added to KEV
2026-03-09
BOD 22-01 due
2026-03-12
Ransomware use
Unknown

01What is this vulnerability?

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

02Affected products

VendorProductVersions
SolarWindsWeb Help Desk12.8.7 and below

03Active exploitation status

Yes — actively exploited. Added to the CISA KEV catalog on 2026-03-09. Ransomware use: Unknown.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

CVE-2024-28988
Cited in vendor advisory
CVE-2024-28986
Cited in vendor advisory

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →