Home

Description

A broken access control vulnerability exists in Serv-U which when exploited, gives a malicious actor the ability to create a system admin user and execute arbitrary code as a privileged account via domain admin or group admin privileges. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.

PUBLISHED Reserved 2025-04-16 | Published 2026-02-24 | Updated 2026-02-25 | Assigner SolarWinds




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-269 Improper Privilege Management

Product status

Default status
affected

SolarWinds Serv-U 15.5.3 and prior versions
affected

References

www.solarwinds.com/...ter/security-advisories/CVE-2025-40538

documentation.solarwinds.com/...rvu_15-5-4_release_notes.htm

cve.org (CVE-2025-40538)

nvd.nist.gov (CVE-2025-40538)

Download JSON