SolarWinds releases emergency hotfix for critical flaw in Web Help Desk
Take action: If you're running SolarWinds Web Help Desk, immediately update to version 12.8.7 Hotfix 1 (HF1). By it's very nature, Web Help Desk may be exposed to the Internet, so you are probably exposed. If you can't update right away, isolate the Web Help Desk from the internet until you can apply the patch.
Learn More
SolarWinds has patched a critical security vulnerability in its Web Help Desk that allows attackers to execute arbitrary commands on the host machine without requiring authentication.
This flaw, tracked as CVE-2025-26399 (CVSS score 9.8), is an unauthenticated AjaxProxy deserialization remote code execution vulnerability caused by insufficient validation of user-supplied data. When successfully exploited, this flaw allows remote attackers to execute code in the context of SYSTEM privileges, leading to complete compromise of affected Web Help Desk instances.
CVE-2025-26399 represents the third iteration of attempts to address the same underlying security flaw. The vulnerability is a patch bypass of CVE-2024-28988 (CVSS score 9.8), which itself was a bypass of CVE-2024-28986 (CVSS score 9.8) that was originally addressed by SolarWinds in August 2024.
Affected versions of SolarWinds Web Help Desk are 12.8.7 and all previous versions.
The fixed software release is SolarWinds Web Help Desk 12.8.7 Hotfix 1 (HF1)
Organizations that had previously installed version 12.8.7 must download and apply Hotfix 1 to fully remediate the vulnerability, as the original 12.8.7 release remains vulnerable to this specific attack vector.
Currently, there is no evidence of CVE-2025-26399 being actively exploited in the wild. Security experts emphasize the high likelihood of future exploitation attempts, given the history of the underlying vulnerability family.
Organizations that cannot immediately upgrade should implement network-level controls to restrict access to the Web Help Desk interface, ensuring it is not exposed to the entire internet.