Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SolarWinds | Web Help Desk | 12.8.8 HF1 and below | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SolarWinds Web Help Desk contains an authentication bypass vulnerability caused by improper access control, letting attackers execute protected actions without authentication, exploit requires no special conditions. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-40552.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-40553 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40551 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40554 | 9.8 CRITICAL | SolarWinds Web Help Desk Authentication Bypass Vulnerability |
| CVE-2025-40536 | 8.1 HIGH | SolarWinds Web Help Desk Security Control Bypass Vulnerability |
| CVE-2025-40537 | 7.5 HIGH | SolarWinds Web Help Desk Hardcoded Credentials Vulnerability |
No comments yet