Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SolarWinds | Web Help Desk | 12.8.8 HF1 and below | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SolarWinds Web Help Desk 12.8.8 HF1 and earlier contains an authentication bypass vulnerability in the WebObjects session handling. By crafting a request with a manipulated path component to an internal admin page endpoint, an unauthenticated attacker can access privileged administrative functions including authentication configuration settings, SAML/CAS setup, and API key management. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-40554.yaml | POC Details |
| 2 | None | https://github.com/imbas007/auth-bypass-CVE-2025-40554 | POC Details |
| 3 | CVE-2025-40554 Exploitation | https://github.com/Skynoxk/CVE-2025-40554 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-40553 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40551 | 9.8 CRITICAL | SolarWinds Web Help Desk Deserialization of Untrusted Data Remote Code Execution Vulnerabi |
| CVE-2025-40552 | 9.8 CRITICAL | SolarWinds Web Help Desk Authentication Bypass Vulnerability |
| CVE-2025-40536 | 8.1 HIGH | SolarWinds Web Help Desk Security Control Bypass Vulnerability |
| CVE-2025-40537 | 7.5 HIGH | SolarWinds Web Help Desk Hardcoded Credentials Vulnerability |
No comments yet