Summarize with:

Share
CVE-2025-26399 in SolarWinds Web Help Desk has moved from “critical but patchable” to an active intrusion problem. CISA added the flaw to its Known Exploited Vulnerabilities catalog in March 2026, while Microsoft and Huntress both reported real-world attacks against exposed WHD instances.
That matters because this is not just another internet-facing bug. The underlying issue is insecure deserialization in the AjaxProxy component, rated CVSS 9.8, and the observed tradecraft shows attackers using the initial foothold for remote code execution, remote management tooling, system discovery, and follow-on access that can lead to credential theft and domain-wide impact.
The practical lesson is simple: if Web Help Desk is exposed to the internet and not upgraded, defenders should treat it as a likely entry point rather than a theoretical risk.
CVE-2025-26399 is a critical-severity deserialization of untrusted data vulnerability (CVSS 9.8) in the AjaxProxy component of SolarWinds Web Help Desk. According to vendor and third-party analysis, exploitation can allow an unauthenticated attacker to execute arbitrary commands on the host running WHD.
NetSPI describes the issue as a network-reachable bug with low attack complexity, no privileges required, and no user interaction. That combination is precisely why exposed service-desk infrastructure becomes so attractive to adversaries.
textInternet attacker -> vulnerable AjaxProxy endpoint -> untrusted deserialization -> command execution on WHD host -> RMM / PowerShell / persistence
The patch path changed over time because SolarWinds Web Help Desk suffered a chain of related issues and patch bypasses. SolarWinds’ WHD 2026.1 release, published on January 28, 2026, fixes multiple critical WHD vulnerabilities and continues the vendor’s modernization and hardening work. Huntress notes that all versions prior to 12.8.7 HF1 should be considered vulnerable to the deserialization class issues that attackers are abusing in the wild.
| Date | Event | Status |
|---|---|---|
| Sep. 2025 | SolarWinds discloses CVE-2025-26399 and releases hotfix guidance | ✅ Patch available |
| Dec. 2025 | Microsoft says observed intrusions were already occurring on vulnerable WHD systems | ⚠️ Initial compromise |
| Jan. 28, 2026 | SolarWinds releases WHD 2026.1 with multiple security fixes | ✅ Patch available |
| Feb. 6, 2026 | Microsoft publishes analysis of active exploitation against exposed WHD | 📢 Public disclosure |
| Feb. 7, 2026 | Huntress investigates hands-on-keyboard exploitation in customer environments | 🔴 Mass exploitation / Active exploitation |
| Mar. 9, 2026 | CISA adds CVE-2025-26399 to the KEV catalog | 🔴 Mass exploitation / Active exploitation |
| Mar. 2026 | Defenders continue incident response and exposure reduction for internet-facing WHD | 🔍 Continuing threat / Investigation |
Public reporting does not yet fully attribute every intrusion to a single actor, but the exploitation pattern is already clear: exposed WHD systems are being targeted by opportunistic and criminal operators who know a help desk server can unlock wider enterprise access.
| Actor | Geography | Payload / Tooling | Focus |
|---|---|---|---|
| Warlock-linked activity | Global | Zoho/ManageEngine tooling, Velociraptor, Cloudflared, PowerShell | Initial access, persistence, post-exploitation |
| Unattributed opportunistic operators | Global | BITS abuse, PowerShell, scheduled tasks, reverse SSH | Fast foothold expansion |
Huntress linked one cluster of activity to Warlock ransomware tradecraft, while Microsoft described multistage intrusions involving legitimate admin tools, scheduled tasks, reverse SSH, and stealthier credential-access techniques. Even before encryption or overt extortion appears, this behavior already fits a mature ransomware pre-positioning model.
This incident is more important than the standalone CVE score suggests because Web Help Desk often sits close to authentication systems, internal workflows, operator accounts, and other sensitive business processes.
In other words, this is not just a patch-management issue. It is a threat intelligence and incident-response problem because the post-exploitation behavior is already documented.
wrapper.exe -> java.exe / javaw.exe -> suspicious child processes.TPMProfiler and check for reverse SSH tunnels, port forwards, or rogue RDP enablement.Microsoft Defender XDR example:
kqlDeviceProcessEvents | where InitiatingProcessParentFileName endswith "wrapper.exe" | where InitiatingProcessFolderPath has "\\WebHelpDesk\\bin\\" | where InitiatingProcessFileName in~ ("java.exe", "javaw.exe") or InitiatingProcessFileName contains "tomcat" | where FileName !in ("java.exe", "pg_dump.exe", "reg.exe", "conhost.exe", "WerFault.exe")
Look for vulnerable systems:
kqlDeviceTvmSoftwareVulnerabilities | where CveId has_any ('CVE-2025-40551', 'CVE-2025-40536', 'CVE-2025-26399')
CVE-2025-26399 is a critical insecure deserialization vulnerability in SolarWinds Web Help Desk’s AjaxProxy component. It can allow unauthenticated remote code execution on exposed servers.
Yes. CISA added the flaw to the KEV catalog in March 2026, and both Microsoft and Huntress documented active exploitation activity against vulnerable WHD deployments.
Upgrade immediately, remove public exposure, rotate credentials reachable from the WHD host, and investigate for signs of post-exploitation tooling or suspicious scheduled tasks.
CVE-2025-26399 is no longer just a critical SolarWinds bug — it is a proven intrusion vector for exposed help desk infrastructure.
✅ KEV status changes the response priority - once CISA marks a flaw as known exploited, the conversation shifts from routine patching to urgent risk reduction.
✅ The first-stage exploit is only the start - Microsoft and Huntress both show how quickly attackers move from WHD access to persistence, reconnaissance, and identity-focused abuse.
If your organization still exposes SolarWinds Web Help Desk to the internet, assume time-to-compromise is short and act accordingly.
Published: 2026-03-15 Author: Invaders Editorial Team Classification: TLP:CLEAR Reading Time: 6 minutes
Written by
Research
A DevOps engineer and cybersecurity enthusiast with a passion for uncovering the latest in zero-day exploits, automation, and emerging tech. I write to share real-world insights from the trenches of IT and security, aiming to make complex topics more accessible and actionable. Whether I’m building tools, tracking threat actors, or experimenting with AI workflows, I’m always exploring new ways to stay one step ahead in today’s fast-moving digital landscape.
Get the latest cybersecurity insights in your inbox.
Threat Hunting & IntelTCLBANKER turns WhatsApp and Outlook into trusted malware delivery channels The most important detail in Elastic's new TCLBANKER research is not just that a Bra...
Threat Hunting & IntelDAEMON Tools supply-chain attack turns trusted installers into a malware delivery path The most important part of the DAEMON Tools incident is not that malware...
Threat Hunting & IntelCVE-2026-41940 turns exposed cPanel and WHM servers into control-plane takeover targets CVE-2026-41940 is a critical authentication bypass in cPanel and WHM, an...