README.md
Rendering markdown...
id: CVE-2025-40554
info:
name: CVE-2025-40554 - SolarWinds Web Help Desk Authentication Bypass
author: rxerium
severity: critical
description: |
SolarWinds Web Help Desk version 12.8.8 Hotfix 1 and prior contains a critical authentication bypass vulnerability (CWE-1390: Weak Authentication) that allows a remote unauthenticated attacker to execute actions or methods on a target system which are intended to be gated by authentication. With a CVSS score of 9.8, this vulnerability can be exploited over the network with low complexity, requires no privileges, and has high impact on confidentiality, integrity, and availability. Based upon the vendor supplied CVSS scores, the impact is equivalent to the RCE deserialization vulnerabilities, likely meaning it can also be leveraged for remote code execution. This vulnerability was discovered by watchTowr's Piotr Bazydlo and disclosed on January 28, 2026. Customers are advised to update to Web Help Desk version 2026.1 on an urgent basis outside of normal patching cycles.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2025-40554
- https://www.rapid7.com/blog/post/etr-multiple-critical-solarwinds-web-help-desk-vulnerabilities-cve-2025-40551-40552-40553-40554/
- https://www.bleepingcomputer.com/news/security/solarwinds-warns-of-critical-web-help-desk-rce-auth-bypass-flaws/
metadata:
verified: true
max-request: 1
vendor: SolarWinds
product: Web Help Desk
cvss-score: 9.8
cwe-id: CWE-1390
cisa-kev: false
shodan-query: http.favicon.hash:"1895809524"
tags: cve,cve2025,solarwinds,webhelpdesk,authbypass,rce
http:
- method: GET
path:
- "{{BaseURL}}/helpdesk/WebObjects/Helpdesk.woa"
stop-at-first-match: true
host-redirects: true
max-redirects: 2
extractors:
- type: regex
name: build_token
part: body
group: 1
regex:
- "\\?v=([0-9]+_[0-9]+_[0-9]+_[0-9]+)"
internal: true
- type: dsl
name: version
dsl:
- "replace(build_token, '_', '.')"
matchers-condition: and
matchers:
- type: word
words:
- "Web Help Desk Software"
- "SolarWinds WorldWide"
- "/WebObjects/Helpdesk.woa"
- "HCS Web Help Desk"
condition: or
- type: dsl
dsl:
- "compare_versions(version, '< 2026.1')"
# *Patched version is 2026.1, so any version below 2026.1 is vulnerable (includes all 12.8.8 Hotfix 1 and earlier versions).*
# versions: https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/release_notes_aggregator.htm?v=2026-1&sort=product&expand=false