Description
SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.
CISA Known Exploited Vulnerability
Date added 2026-03-09 | Due date 2026-03-12
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Problem types
CWE-502: Deserialization of Untrusted Data
Product status
12.8.7 and below
Credits
Anonymous working with Trend Micro Zero Day Initiative
References
www.microsoft.com/...-exploitation-solarwinds-web-help-desk/
www.cisa.gov/...erabilities-catalog?field_cve=CVE-2025-26399
www.solarwinds.com/...ter/security-advisories/CVE-2025-26399
documentation.solarwinds.com/...7-hotfix-1_release_notes.htm