SolarWinds’ Web Help Desk: RCE Flaws Reawaken Supply-Chain Ghosts

SolarWinds discloses six Web Help Desk flaws, four critical RCE and auth bypass bugs rated 9.8 CVSS, urging upgrades to 2026.1. Echoing 2020 supply-chain attack and prior exploits, experts warn of rapid weaponization and massive downstream risks.
SolarWinds’ Web Help Desk: RCE Flaws Reawaken Supply-Chain Ghosts
Written by Corey Blackwell

SolarWinds Inc. faces renewed scrutiny after disclosing six serious vulnerabilities in its Web Help Desk software, including four critical flaws that enable remote code execution and authentication bypass without credentials. The issues, tracked as CVE-2025-40551, CVE-2025-40553, CVE-2025-40552, and CVE-2025-40554—all rated 9.8 out of 10 on the CVSS severity scale—affect versions prior to 2026.1 and expose more than 300,000 customers, including Fortune 500 firms and government agencies, to potential compromise.

Researchers from watchTowr and Horizon3.ai uncovered the defects. Piotr Bazydlo of watchTowr reported the authentication bypasses and one deserialization RCE, while Jimi Sebree of Horizon3.ai flagged another RCE alongside high-severity CVE-2025-40536 and CVE-2025-40537. “The four critical bugs are typically very reliable to exploit,” said Ryan Emmons of Rapid7. “For attackers, that’s good news, because it means avoiding lots of bespoke exploit development work.”

SolarWinds urges immediate upgrades to version 2026.1, with detailed instructions available in its release notes. The flaws stem from untrusted data deserialization and flawed authentication logic, allowing unauthenticated attackers to execute commands, access restricted functions, and pivot laterally.

Deserialization Dangers Resurface

At the core of the critical risks are CVE-2025-40551 and CVE-2025-40553, both Java deserialization vulnerabilities that let remote attackers run arbitrary commands on host machines. Successful exploitation grants full control over the software, stored data, and network access. CVE-2025-40552 and CVE-2025-40554 bypass authentication to invoke protected actions, chaining easily with RCE for devastating impact, as noted in CSO Online.

High-severity CVE-2025-40536 circumvents security controls for unauthorized access, while CVE-2025-40537 exposes hardcoded credentials that could elevate low-privilege users to admin roles. No evidence of in-the-wild exploitation exists yet, but history suggests swift weaponization. “These are bugs that likely won’t take long to develop weaponized exploits for, so time is of the essence,” Emmons warned.

Web Help Desk, used for IT ticketing and asset management, often resides in sensitive environments, amplifying risks. Enterprises must scan for exposed instances and monitor logs for anomalies during patching.

Patch History Plagued by Bypasses

This cluster revives memories of prior Web Help Desk woes. In September 2025, SolarWinds issued its third patch for a persistent RCE chain: CVE-2025-26399 bypassed fixes for CVE-2024-28988 and the exploited CVE-2024-28986, all AjaxProxy deserialization flaws rated 9.8, per BleepingComputer. CISA added the original to its Known Exploited Vulnerabilities catalog after rapid attacks.

Earlier in 2024, CISA flagged a hardcoded credential flaw in Web Help Desk, echoing CVE-2025-40537. “Given SolarWinds’ past, in-the-wild exploitation is highly likely,” watchTowr researchers stated in Help Net Security. These repeats highlight legacy code vulnerabilities, with attackers drawn to the brand’s high-value targets.

SolarWinds’ Orion platform suffered the 2020 Sunburst supply-chain attack, compromising 18,000 customers including U.S. agencies. Though unrelated technically, Web Help Desk flaws evoke similar downstream perils, as David Shipley of Beauceron Security told CSO Online: “We already know what happens if you compromise SolarWinds… There’s a massive downstream risk.”

Expert Warnings Echo Trauma

“It’s like, ‘not again,’” Shipley said. “Everyone has this visceral, emotional reaction based on what happened to them [five years ago].” The brand’s notoriety creates a “perverse form of brand awareness,” he added, urging root-cause fixes beyond symptoms. “Vendors must get down past the symptom layer and address the root cause of vulnerabilities in programming logic… this is unsustainably bad for IT managers.”

Rapid7’s analysis confirms low-complexity attacks: deserialization accepts standardized payloads for reliable RCE. On X, The Hacker News highlighted the unauthenticated paths, while BleepingComputer detailed researcher credits and patching urgency.

CISA’s involvement in past flaws mandates federal patches within weeks, pressuring enterprises to prioritize. SolarWinds recommends non-internet-facing deployments, but many expose instances, per advisories.

Remediation and Risk Mitigation

Upgrade to Web Help Desk 2026.1 resolves all six CVEs. Backup files before updating, stop services, replace JARs as instructed, and verify. Inventory deployments, segment networks, and deploy intrusion detection for deserialization attempts or auth anomalies.

Broader lessons demand code modernization. Shipley warned: “The only way out of this mess is to have better code… we are now doomed to the legacy code. The levees are going to break soon.” Enterprises should audit all SolarWinds tools, apply patches promptly, and reconsider legacy reliance amid persistent flaws.

While no exploits surface yet, the pattern—from 2020’s catastrophe to repeated 2024-2026 patches—signals urgency. IT leaders, scarred by history, race to fortify before attackers capitalize again.

Subscribe for Updates

EnterpriseSecurity Newsletter

News, updates and trends in enterprise-level IT security.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us