Critical Hotfix Released for SolarWinds Web Help Desk to Address RCE Vulnerability CVE-2025-26399

Published:

spot_img

SolarWinds Releases Critical Hotfix for Web Help Desk Vulnerability

SolarWinds has recently rolled out a hotfix aimed at addressing a significant remote code execution (RCE) vulnerability in its Web Help Desk (WHD) software. This vulnerability, now marked as CVE-2025-26399, represents the third attempt to patch an issue that initially surfaced as CVE-2024-28986. The urgency of this release highlights the importance of swift action in the realm of cybersecurity.

Understanding the Vulnerability: CVE-2025-26399

The vulnerability specifically affects Web Help Desk version 12.8.7, which is the latest iteration of the software tailored for mid-sized and large organizations. Widely utilized for managing IT support requests, automating workflows, tracking assets, and adhering to compliance requirements, the software plays a crucial role in organizational IT frameworks. The core issue lies in unsafe deserialization within the AjaxProxy component, which allows unauthenticated attackers to execute arbitrary code on the host system.

According to a security bulletin released by SolarWinds on September 23, 2025, CVE-2025-26399 is described as a patch bypass pertaining to CVE-2024-28988, which was itself a bypass of the original vulnerability CVE-2024-28986. This chain of vulnerabilities has prompted a heightened focus on cybersecurity, as each iteration introduces risks to operational integrity.

The vulnerability has been rated a critical 9.8 on the CVSS scale, indicating it poses a serious threat to systems running the affected version. Notably, the exploitation does not require user interaction or authentication, making it even more alarming for organizations relying on this software.

Hotfix Details and Installation Instructions

The new patch, Web Help Desk 12.8.7 Hotfix 1, includes several modifications to core components of the application to mitigate the deserialization issue. Affected files include:

  • whd-core.jar
  • whd-web.jar
  • whd-persistence.jar
  • HikariCP.jar (added)

Administrators seeking to apply the patch should start by stopping the WHD service. It’s crucial to back up and replace the specified .jar files located in the application’s /lib directory before restarting the system. Be aware that this hotfix is exclusively compatible with WHD version 12.8.7.

The installation process will vary based on the operating system. The default installation paths for the hotfix are as follows:

  • macOS: /Library/WebHelpDesk
  • Windows: \Program Files\WebHelpDesk
  • Linux: /usr/local/webhelpdesk

Complete installation guidelines and the hotfix package can be accessed through the SolarWinds Customer Portal. Additionally, administrators should consult the WHD 12.8.7 Hotfix 1 Administrator Guide for a comprehensive overview of deployment procedures.

Continuous Security Challenges Surrounding CVE-2025-26399

This ongoing vulnerability in SolarWinds’ software has escalated concerns within the cybersecurity community regarding the necessity for robust patch validation and quality assurance processes. While the company has taken steps to remedy this issue through successive updates, the repeated instances of bypass emphasize that the root cause may not have been adequately addressed.

SolarWinds emphasizes the critical nature of this update, encouraging customers who have installed Web Help Desk version 12.8.7 to download and apply Hotfix 1.

Organizations using WHD should also remain vigilant about aligning their installations with the software’s end-of-life (EOL) policies and upgrade paths. Recent releases have halted support for FIPS configuration files, prompting additional compliance steps for federal deployments.

Security teams leveraging SolarWinds Web Help Desk must evaluate their exposure and prioritize implementing Hotfix 1 to safeguard their systems from potential exploitation stemming from this critical vulnerability.


This article aims to provide essential information for organizations utilizing SolarWinds Web Help Desk software, emphasizing the need for prompt action in light of serious security vulnerabilities.

spot_img

Related articles

Recent articles

Ingram Micro Data Breach: Ransomware Attack Impacts 42,000+ Individuals

Ingram Micro Data Breach: Insights into the Cybersecurity Incident In recent news, Ingram Micro, one of the leading distributors of IT products globally, has confirmed...

500+ Officials Join Webinar on I4C Bank Account Freezing Rules

Navigating the Storm: A Deep Dive into India's Cyber Fraud Response Mechanism On January 21, over 500 professionals—including police officers, bankers, lawyers, prosecutors, and compliance...

EU to Eliminate High-Risk Mobile and Telecom Network Products

The European Commission has introduced a comprehensive cybersecurity legislative package aimed at enhancing the safety of Information and Communication Technologies (ICT) supply...

Global Industry Leaders Unite at Morocco’s Inaugural Industry 4.0 Exhibition: WAM Morocco

WAM Morocco: A New Dawn for Industrial Innovation The World Advanced Manufacturing and Future Mobility Exhibition (WAM Morocco) is set to make history by...