SolarWinds has issued a security advisory for five critical vulnerabilities in its Web Help Desk (WHD) platform, an IT service management tool used by over 300,000 organizations worldwide. The batch of flaws includes two unauthenticated remote code execution (RCE) vulnerabilities and two authentication bypasses, all rated with a critical CVSS score of 9.8. The disclosure is particularly concerning as it demonstrates a persistent failure to secure the platform; one of the new vulnerabilities is the second failed attempt to patch an insecure deserialization flaw first reported 17 months ago. These vulnerabilities could provide attackers with a direct gateway into an organization's internal IT infrastructure, making immediate remediation essential.
The disclosure covers five distinct but related vulnerabilities that expose SolarWinds WHD instances to severe risk:
A central issue is the recurring failure to fix an insecure deserialization vulnerability in the AjaxProxy component. The original flaw, CVE-2024-28986, was patched, but that patch was bypassed by CVE-2025-26399 in September 2025. Now, CVE-2025-40553 represents a third iteration of the same underlying weakness, demonstrating a systemic issue in the patching process.
The risk is highest for the thousands of organizations that expose their WHD instances directly to the internet.
As of this report, there is no public confirmation of active exploitation in the wild. However, given the critical 9.8 CVSS scores and the history of this vulnerability class, security researchers and threat actors will likely develop proof-of-concept exploits very quickly. The three-week remediation deadline for U.S. federal agencies indicates that intelligence services consider exploitation highly probable.
A successful exploit of the RCE or authentication bypass vulnerabilities would be catastrophic. Since WHD is an IT service management platform, it is often deeply integrated with other core IT systems and holds sensitive data and credentials.
An attacker could:
Security teams should proactively hunt for signs of exploitation attempts against their WHD instances:
| Type | Value | Description |
|---|---|---|
| URL Pattern | /helpdesk/ra.po |
Monitor web server logs for suspicious POST requests to the AjaxProxy endpoint, which has been the source of the deserialization flaws. |
| Process Name | w3wp.exe or java.exe |
Monitor the process hosting the WHD application for suspicious child processes like cmd.exe, powershell.exe, or any unexpected network connections. |
| Network Traffic Pattern | Outbound connections from WHD server | Look for connections to unknown or malicious IP addresses, which could indicate C2 communication after a successful RCE. |
Web Server Log Analysis: Scrutinize access logs for internet-facing WHD servers. Look for unusual or malformed requests to the /helpdesk/ra.po endpoint. Any requests containing serialized Java objects or unusual character strings should be investigated.
Endpoint Monitoring: Use an EDR solution to monitor the WHD server for anomalous process creation. The application's worker process should not be spawning command shells or making unexpected outbound connections.
Vulnerability Scanning: Run authenticated and unauthenticated vulnerability scans against WHD instances to confirm if they are vulnerable to the newly disclosed CVEs.
Patch Immediately: The top priority is to update all SolarWinds WHD instances to the latest patched version provided by SolarWinds. Due to the 9.8 CVSS scores, this should be treated as an emergency change.
Restrict Access: If patching cannot be done immediately, restrict network access to the WHD platform. It should not be exposed to the public internet. Access should be limited to internal users or through a secure VPN with multi-factor authentication.
Web Application Firewall (WAF): Deploy a WAF with rules designed to inspect and block malicious serialized objects in HTTP requests. This can provide a layer of virtual patching against deserialization attacks, but it should not be relied upon as a primary control.
CISA adds SolarWinds WHD RCE (CVE-2025-40551) to KEV catalog, confirming active exploitation. Federal agencies must patch by Feb 6; all organizations urged to update.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical remote code execution (RCE) vulnerability, CVE-2025-40551, in SolarWinds Web Help Desk (WHD) to its Known Exploited Vulnerabilities (KEV) catalog. This confirms active, in-the-wild exploitation of the deserialization flaw (CVSS 9.8). CISA has mandated that all Federal Civilian Executive Branch (FCEB) agencies must patch this vulnerability by February 6, 2026. This development significantly increases the urgency for all organizations using SolarWinds WHD to apply the latest security patches immediately to prevent compromise. The vulnerability allows unauthenticated attackers to execute arbitrary code.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats