Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SolarWinds | Web Help Desk | 12.8.8 HF1 and below | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SolarWinds Web Help Desk before version 2026.1 contains an insecure deserialization vulnerability in the jabsorb JSON-RPC library. When chained with a CSRF whitelist bypass (CVE-2025-40536), remote unauthenticated attackers can exploit JNDI injection via the Apache Xalan JNDIConnectionPool class to achieve remote code execution. The bypass involves including "/ajax/" in a query parameter to circumvent URI validation, while switching from "/ajax/" to "/wo/" endpoints bypasses payload sanitization routines. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-40551.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-40553 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40552 | 9.8 CRITICAL | SolarWinds Web Help Desk Authentication Bypass Vulnerability |
| CVE-2025-40554 | 9.8 CRITICAL | SolarWinds Web Help Desk Authentication Bypass Vulnerability |
| CVE-2025-40536 | 8.1 HIGH | SolarWinds Web Help Desk Security Control Bypass Vulnerability |
| CVE-2025-40537 | 7.5 HIGH | SolarWinds Web Help Desk Hardcoded Credentials Vulnerability |
No comments yet