A severe vulnerability, dubbed "SOAPwn," was disclosed on December 19, 2025, affecting .NET applications that use SOAP-based web services. This flaw enables a remote, unauthenticated attacker to bypass security mechanisms and execute arbitrary code on the server. Given that SOAP, while a legacy protocol, is still deeply embedded in many enterprise applications for critical functions like financial transactions and data exchange, this vulnerability poses a significant threat. An attacker could exploit SOAPwn to compromise application servers, steal sensitive data, or disrupt core business processes. Microsoft has acknowledged the issue, released patches, and provided guidance for mitigation.
Details surrounding "SOAPwn" are still emerging, but the core of the issue lies in the way .NET applications parse and handle specially crafted SOAP requests.
The vulnerability likely stems from a flaw in the deserialization process of the SOAP message. By crafting a malicious payload within the SOAP envelope, an attacker can trick the application into executing unintended code, bypassing authentication and authorization checks that would normally be performed.
<!-- Conceptual Example of a Malicious SOAP Request -->
<soap:Envelope xmlns:soap="http://www.w3.org/2003/05/soap-envelope">
<soap:Header>
<!-- Malicious headers to manipulate security context -->
</soap:Header>
<soap:Body>
<vulnerableAction>
<parameter>
<!-- Payload that triggers deserialization RCE -->
<maliciousObject>...</maliciousObject>
</parameter>
</vulnerableAction>
</soap:Body>
</soap:Envelope>
Any .NET application (including legacy ASP.NET and Windows Communication Foundation - WCF) that exposes a SOAP endpoint could be vulnerable. This is particularly common in:
Organizations may have many such legacy endpoints that are not well-documented but are still active and exposed.
The public disclosure did not specify if the vulnerability is being actively exploited. However, vulnerabilities of this type—unauthenticated RCE in a widely used enterprise protocol—are prime targets for rapid weaponization by threat actors. Organizations should assume that exploitation is imminent, if not already occurring.
A successful exploit of SOAPwn could be catastrophic for an enterprise:
Security teams should look for the following indicators:
| Type | Value | Description |
|---|---|---|
url_pattern |
*.asmx, *.svc |
Default file extensions for legacy .NET SOAP web services. Finding these on web servers can indicate potentially vulnerable endpoints. |
network_traffic_pattern |
Unusually large or malformed SOAP/XML requests in web server logs. | Look for requests that deviate significantly from normal application traffic. |
log_source |
IIS Logs / Application Logs | Monitor for exceptions related to XML parsing or deserialization, or for successful actions performed without corresponding authentication logs. |
process_name |
w3wp.exe (IIS Worker Process) spawning unusual child processes like cmd.exe or powershell.exe. |
This is a strong indicator of successful RCE on the web server. |
D3FEND Reference: D3-NTA: Network Traffic Analysis, D3-PC: Process Creation-based Analysis
.asmx and .svc files.w3wp.exe) on all .NET web servers. Alert on any instance of this process spawning child processes like cmd.exe, powershell.exe, curl.exe, etc., as this is highly indicative of a web shell or RCE.D3FEND Reference: D3-SU: Software Update, D3-ACH: Application Configuration Hardening
Applying the patches from Microsoft for the .NET Framework is the primary mitigation.
Mapped D3FEND Techniques:
Isolating legacy applications and restricting their network access can limit the blast radius of a compromise.
If the SOAP service is only used internally, ensure it is not exposed to the internet.
Mapped D3FEND Techniques:
A key indicator of successful RCE against a web application like one vulnerable to SOAPwn is the web server process spawning unexpected child processes. Security teams must configure their EDR or SIEM to monitor the IIS worker process, w3wp.exe. Create a high-priority alert that triggers whenever w3wp.exe is observed as the parent process for cmd.exe, powershell.exe, cscript.exe, wscript.exe, curl.exe, or wget.exe. In a properly configured environment, this behavior is almost always malicious and indicates that an attacker has successfully executed code on the server. This detection provides a high-confidence signal to trigger an automated incident response action, such as isolating the host from the network.
The definitive solution to the SOAPwn vulnerability is to apply the security patches provided by Microsoft for the affected .NET Framework versions. Organizations must use their patch management and asset inventory systems to identify all web servers running .NET applications with exposed SOAP endpoints (.asmx, .svc). These servers should be patched on an emergency basis. Given the unauthenticated RCE nature of the flaw, any delay in patching represents a significant and unacceptable risk to the organization. Post-patching, vulnerability scanners should be used to verify that the patch has been applied correctly and the vulnerability is remediated.
As a long-term strategic mitigation, organizations must plan to migrate away from legacy SOAP-based services. SOAP and its reliance on complex XML parsing and deserialization have historically been a rich source of security vulnerabilities. Development teams should be directed to prioritize the modernization of these applications, refactoring them to use modern, more secure RESTful APIs with JSON. REST APIs generally have a smaller and simpler attack surface than SOAP. This not only mitigates the risk of SOAPwn and future similar vulnerabilities but also improves performance and maintainability. This represents a shift from a reactive patching cycle to a proactive architectural improvement.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats