Summarize with:

Share
On January 27–28, 2026, SolarWinds disclosed five critical vulnerabilities in Web Help Desk (WHD), its widely deployed IT service management platform used by 300,000+ organizations globally. The batch includes:
This latest disclosure compounds a 17-month pattern of repeated patching failures: the original AjaxProxy deserialization flaw (CVE-2024-28986, disclosed August 2024) has now been bypassed twice—in September 2025 (CVE-2025-26399) and again in January 2026 (CVE-2025-40553).
For organizations with internet-facing WHD instances, the combination of unauthenticated RCE and authentication bypass creates a critical gateway to internal IT infrastructure and sensitive data. Federal agencies face a three-week remediation deadline; commercial organizations should treat this as an emergency-priority patch.
SolarWinds released patches for Web Help Desk 2026.1 today, addressing six security flaws across two categories: authentication/authorization bypasses and remote code execution.
Both vulnerabilities stem from unsafe Java deserialization in the AjaxProxy component, the same attack surface that has been a recurring source of failures since August 2024. The flaws allow unauthenticated attackers to craft malicious JSON-RPC requests that execute arbitrary code with NETWORK SERVICE privileges.
Malicious JSON-RPC Payload: Attacker crafts a request targeting the AjaxProxy endpoint, including a whitelisted term (e.g., "java") to bypass input blacklist filters.
Path Manipulation: Request path is changed from /ajax to /wo to evade URI sanitization routines.
Session Forgery: The deserialization process instantiates Java objects with properties that forge a valid user session.
Code Execution: The jabsorb JSON-RPC library processes the malicious object, leading to arbitrary command execution on the host.
The payloads can drop secondary malware, establish reverse shells, or exfiltrate sensitive help desk data containing passwords and service account credentials.
Discovered by watchTowr researcher Piotr Bazydlo, these authentication bypass flaws allow remote, unauthenticated attackers to execute actions that should require valid credentials. Low-complexity attacks can invoke protected methods without authentication checks, granting unauthorized access to help desk functionality.
Hardcoded credentials within the WHD codebase allow attackers with low privilege to escalate to administrative functions. This pattern mirrors the critical August 2024 flaw (CVE-2024-28987), which used hardcoded username/password combinations (helpdeskIntegrationUser / dev-C4F8025E7) to grant full access to ticket data.
Cross-site request forgery protection mechanisms within WHD's WebObjects framework can be bypassed, allowing unauthenticated attackers to access restricted functionality by forging requests.
SolarWinds warns of critical Web Help Desk RCE, auth bypass flaws - image
The January 2026 disclosure is not an isolated incident but the latest chapter in a cascading series of security failures in SolarWinds' flagship IT service management product.
| Date | CVE | Severity | Event | Status |
|---|---|---|---|---|
| Aug 13, 2024 | CVE-2024-28986 | CVSS 9.8 | Original AjaxProxy deserialization RCE discovered | 🔴 Exploited in wild |
| Aug 14, 2024 | — | — | SolarWinds releases first patch | ⚠️ Incomplete fix |
| Aug 15, 2024 | CVE-2024-28986 | — | CISA adds to KEV catalog | 📢 Federal mandate |
| Aug 16, 2024 | CVE-2024-28987 | CVSS 9.1 | Hardcoded credentials discovered (helpdeskIntegrationUser) | 🔴 Exploited in wild |
| Aug 21, 2024 | CVE-2024-28987 | — | Hardcoded credentials patched (5 days) | ✅ Fixed |
| Sept 22-23, 2025 | CVE-2025-26399 | CVSS 9.8 | First patch bypass of CVE-2024-28986 | 🔴 Active exploitation |
| Sept 23, 2025 | CVE-2025-26399 | — | CISA adds bypass to KEV catalog | 📢 Second mandate |
| Oct 15, 2025 | CVE-2024-28987 | — | CISA adds hardcoded credentials to KEV | 📢 Delayed addition |
| Jan 27-28, 2026 | CVE-2025-40551<br>CVE-2025-40553<br>CVE-2025-40552<br>CVE-2025-40554<br>CVE-2025-40537<br>CVE-2025-40536 | CVSS 9.8<br>CVSS 9.8<br>CVSS 9.8<br>CVSS 9.8<br>CVSS 7.5<br>CVSS 8.8 | Five critical CVEs disclosed<br>Second patch bypass<br>Authentication bypass (×2)<br>Hardcoded credentials<br>CSRF bypass | 🔴 Active exploitation confirmed |
SolarWinds released a patch on August 14, 2024, but the fundamental deserialization mechanism in AjaxProxy was not comprehensively secured—setting the stage for two subsequent bypasses within 16 months.
helpdeskIntegrationUserdev-C4F8025E7Timeline Complexity: This is the third patch attempt on the same underlying AjaxProxy deserialization flaw:
This disclosure represents a critical vendor failure: nearly one year after the original patch, attackers discovered a second way to exploit the exact same vulnerability through a different Java object instantiation path.
To contextualize the severity of this vulnerability cluster, it is instructive to compare WHD's vulnerability landscape against the 2020 SUNBURST supply chain attack that compromised 18,000 organizations, including U.S. federal agencies.
SUNBURST vs Web Help Desk Comparison
| Dimension | SUNBURST (2020) | Web Help Desk (2024–2026) |
|---|---|---|
| Initial Compromise Method | Trojaned software updates (supply chain) | Internet-facing help desk endpoint |
| Authentication Required | Not disclosed | None (unauthenticated RCE) |
| Time to Full System Compromise | Days (multi-stage) | Immediate (single-step RCE) |
| Data Exposed | Organizational networks broadly | Help desk tickets (passwords, service accounts) |
| Patch Stability | N/A (supply chain vs. product flaw) | Failed three times in 17 months |
| Attack Complexity | High (sophisticated tradecraft) | Low (trivial JSON-RPC exploit) |
| CISA Response | Major incident; emergency directives | KEV catalog addition; 3-week deadline |
| Organizations Affected | 18,000 | 300,000+ (potential exposure) |
While SUNBURST required sophisticated nation-state tradecraft and supply-chain access, Web Help Desk vulnerabilities are exploitable by any attacker with network access—and many organizations have WHD facing the public internet for remote support access.
WHD serves as the centralized IT support ticketing platform, storing:
Critical Risk: An attacker gaining control of WHD gains direct visibility into an organization's internal IT operations and access to credentials that unlock further lateral movement.
SolarWinds has confirmed that at least one of the January 2026 vulnerabilities is actively being exploited in the wild. The combination of unauthenticated RCE + authentication bypass + hardcoded credentials creates multiple attack chains that do not require initial access:
The September 2025 patch bypass (CVE-2025-26399) is particularly alarming because it reveals that SolarWinds' patch development process is fundamentally broken:
| Version | Release Date | Status | Issue |
|---|---|---|---|
| ≤12.8.2 | August 2024 | ❌ Vulnerable | CVE-2024-28986 (Original RCE flaw) |
| 12.8.3 (original) | August 2024 | ❌ Vulnerable | CVE-2024-28988 bypass (Incomplete patch) |
| 12.8.3 HF1 (hotfix 1) | August 2024 | ❌ Vulnerable | CVE-2025-26399 bypass (Second bypass) |
| 12.8.3 HF2 | September 2024 | ❌ Vulnerable | CVE-2025-26399 bypass (Third patch incomplete) |
| 12.8.7 | December 2025 | ❌ Vulnerable | CVE-2025-40551/40553 (New RCE variants) |
| 2026.1 | January 2026 | ✅ Patched | Should address all six flaws |
Critical Finding: Organizations running 12.8.7 believed they were on the latest secure version. They were not.
Monitor your environment for these indicators of compromise:
textSuspicious Activity Indicators: - JSON-RPC requests to /ajax/ or /wo/ endpoints - Requests containing "java" or serialized object payloads - Help desk database reads immediately after unknown authentication events - NETWORK SERVICE process spawning unusual child processes - Reverse shell connections from WHD servers - Unauthorized access to ticket databases - Bulk exports of help desk data
Splunk Example:
splindex=web_logs sourcetype=solarwinds_whd | search uri_path IN ("/ajax/*", "/wo/*") | search request_body="*java*" OR request_body="*serialize*" | stats count by src_ip, uri_path, method
Microsoft Sentinel Example:
kqlCommonSecurityLog | where DeviceVendor == "SolarWinds" | where RequestURL contains "/ajax/" or RequestURL contains "/wo/" | where RequestContext contains "java" or RequestContext contains "serialize" | summarize count() by SourceIP, RequestURL, TimeGenerated
Implement Web Application Firewall (WAF)
Enable Multi-Factor Authentication (MFA)
Database Activity Monitoring (DAM)
Network Segmentation
This 17-month pattern of patching failures—including two subsequent bypasses of the same core flaw—suggests that SolarWinds' security development practices require fundamental remediation.
Organizations should:
✅ Request a security audit of WHD's AjaxProxy and deserialization handling from SolarWinds
✅ Establish a 90-day post-patch re-assessment schedule (testing for additional bypasses)
✅ Consider alternative help desk solutions for long-term strategic planning
✅ Evaluate SolarWinds' vulnerability disclosure and patch development processes as part of vendor risk assessment
Per CISA directive, federal civilian executive branch agencies have a three-week deadline to remediate critical SolarWinds Web Help Desk vulnerabilities.
| Milestone | Date | Requirement |
|---|---|---|
| Disclosure | January 27–28, 2026 | CISA formal notification |
| Patch Deployment Deadline | February 17–18, 2026 | Federal agencies must patch |
| Verification | February 20, 2026 | Confirm remediation complete |
Critical infrastructure operators should adopt the same timeline as a best practice, given that help desk systems are often targeted for initial access in supply-chain intrusions.
CVE-2025-40551, 40552, 40553, 40554, 40537, and 40536 represent a critical convergence of authentication bypass, unauthenticated RCE, and hardcoded credentials in a platform that manages IT infrastructure across 300,000+ organizations.
🔴 The 17-month history of repeated patching failures—including two bypasses of the same flaw in less than one year—demonstrates that SolarWinds cannot be trusted to secure this product without fundamental architectural remediation.
🔴 Organizations must treat patching as emergency-priority, remove WHD from the public internet immediately, and rotate all service account credentials that may have been exposed.
🔴 For federal agencies and critical infrastructure operators, the three-week remediation deadline is a regulatory requirement; for commercial organizations, it should be treated as an operational emergency.
This vulnerability cluster is worse than the original SUNBURST supply chain attack in one critical dimension:
It requires zero initial access and affects even organizations running the latest versions.
CVE-2025-40551 & CVE-2025-40553 AjaxProxy Deserialization RCE
Bleeping Computer - SolarWinds Warns of Critical Web Help Desk RCE and Auth Bypass Flaws
SecurityOnline - SolarWinds Web Help Desk Hit with Multiple RCE and Auth Bypass Vulnerabilities
CyberKendra - Critical Unauthenticated RCE Flaw Exposes SolarWinds Web Help Desk
CtrAltNod - SolarWinds Fixes Critical Web Help Desk RCE Flaws Under Attack
HelpNetSecurity - SolarWinds fixes critical Web Help Desk RCE vulnerability (CVE-2025-26399)
TheHackerNews - SolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution
RunZero - Latest SolarWinds Vulnerabilities: How to Find Affected Assets
ZeroPath - SolarWinds Web Help Desk CVE-2025-26399: AjaxProxy Deserialization RCE Summary
CERT-EU - Critical Vulnerability in SolarWinds Web Help Desk (September 2025)
CVE Details - CVE-2024-28986: SolarWinds Web Help Desk Java Deserialization RCE
SentinelOne Vulnerability Database - CVE-2024-28986: SolarWinds Web Help Desk RCE
Arctic Wolf - CVE-2024-28986 & CVE-2024-28987 Follow-Up: New SolarWinds Hotfix
Security Affairs - CISA Adds SolarWinds Web Help Desk Bug to Known Exploited Vulnerabilities Catalog
SecurityWeek - CISA Flags Critical SolarWinds Web Help Desk Bug for In-the-Wild Exploitation
CyberSecurityDive - CISA Adds SolarWinds Flaw to Exploited Vulnerabilities Catalog
Horizon3.ai - CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep Dive
CIS Security - Guiding SLTTs Through the SolarWinds Supply Chain Attack
TechTarget - SolarWinds Hack Explained: Everything You Need to Know
SolarWinds Documentation - Web Help Desk 2026.1 Release Notes
CISA Known Exploited Vulnerabilities Catalog - SolarWinds (August 2024)
CISA Known Exploited Vulnerabilities Catalog - SolarWinds (October 2024)
SOCDefenders.ai - SolarWinds Web Help Desk Critical Vulnerabilities Summary
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Cloud & Application SecurityLiteLLM SQL injection flaw puts AI gateways on the front line CVE-2026-42208 matters because it turns an AI gateway into a high-value choke point for attackers....
Cloud & Application SecurityVishing and SSO abuse are accelerating rapid SaaS extortion The most dangerous part of modern SaaS intrusions is not always malware. Sometimes it is speed, trus...
Cloud & Application SecurityConsentFix v3 turns Azure OAuth phishing into a scalable token theft risk ConsentFix v3 matters because it shifts Azure account compromise away from password th...