Critical Hotfix Released for SolarWinds Web Help Desk to Address RCE Vulnerability CVE-2025-26399

Published:

spot_img

SolarWinds Releases Critical Hotfix for Web Help Desk Vulnerability

SolarWinds has recently rolled out a hotfix aimed at addressing a significant remote code execution (RCE) vulnerability in its Web Help Desk (WHD) software. This vulnerability, now marked as CVE-2025-26399, represents the third attempt to patch an issue that initially surfaced as CVE-2024-28986. The urgency of this release highlights the importance of swift action in the realm of cybersecurity.

Understanding the Vulnerability: CVE-2025-26399

The vulnerability specifically affects Web Help Desk version 12.8.7, which is the latest iteration of the software tailored for mid-sized and large organizations. Widely utilized for managing IT support requests, automating workflows, tracking assets, and adhering to compliance requirements, the software plays a crucial role in organizational IT frameworks. The core issue lies in unsafe deserialization within the AjaxProxy component, which allows unauthenticated attackers to execute arbitrary code on the host system.

According to a security bulletin released by SolarWinds on September 23, 2025, CVE-2025-26399 is described as a patch bypass pertaining to CVE-2024-28988, which was itself a bypass of the original vulnerability CVE-2024-28986. This chain of vulnerabilities has prompted a heightened focus on cybersecurity, as each iteration introduces risks to operational integrity.

The vulnerability has been rated a critical 9.8 on the CVSS scale, indicating it poses a serious threat to systems running the affected version. Notably, the exploitation does not require user interaction or authentication, making it even more alarming for organizations relying on this software.

Hotfix Details and Installation Instructions

The new patch, Web Help Desk 12.8.7 Hotfix 1, includes several modifications to core components of the application to mitigate the deserialization issue. Affected files include:

  • whd-core.jar
  • whd-web.jar
  • whd-persistence.jar
  • HikariCP.jar (added)

Administrators seeking to apply the patch should start by stopping the WHD service. It’s crucial to back up and replace the specified .jar files located in the application’s /lib directory before restarting the system. Be aware that this hotfix is exclusively compatible with WHD version 12.8.7.

The installation process will vary based on the operating system. The default installation paths for the hotfix are as follows:

  • macOS: /Library/WebHelpDesk
  • Windows: \Program Files\WebHelpDesk
  • Linux: /usr/local/webhelpdesk

Complete installation guidelines and the hotfix package can be accessed through the SolarWinds Customer Portal. Additionally, administrators should consult the WHD 12.8.7 Hotfix 1 Administrator Guide for a comprehensive overview of deployment procedures.

Continuous Security Challenges Surrounding CVE-2025-26399

This ongoing vulnerability in SolarWinds’ software has escalated concerns within the cybersecurity community regarding the necessity for robust patch validation and quality assurance processes. While the company has taken steps to remedy this issue through successive updates, the repeated instances of bypass emphasize that the root cause may not have been adequately addressed.

SolarWinds emphasizes the critical nature of this update, encouraging customers who have installed Web Help Desk version 12.8.7 to download and apply Hotfix 1.

Organizations using WHD should also remain vigilant about aligning their installations with the software’s end-of-life (EOL) policies and upgrade paths. Recent releases have halted support for FIPS configuration files, prompting additional compliance steps for federal deployments.

Security teams leveraging SolarWinds Web Help Desk must evaluate their exposure and prioritize implementing Hotfix 1 to safeguard their systems from potential exploitation stemming from this critical vulnerability.


This article aims to provide essential information for organizations utilizing SolarWinds Web Help Desk software, emphasizing the need for prompt action in light of serious security vulnerabilities.

spot_img

Related articles

Recent articles

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Deceptive Remote Employment Schemes

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Deceptive Remote Employment Schemes The U.S. Department of the Treasury's Office of Foreign Assets Control...

E-Commerce Faces Escalating Cybersecurity Risks in 2026 as AI-Powered Attacks Surge

E-Commerce Faces Escalating Cybersecurity Risks in 2026 as AI-Powered Attacks Surge In 2026, a single misstep can transform a successful online retail operation into a...

Fed Holds Rates Steady Amid Rising Inflation and Iran War Uncertainty

Fed Holds Rates Steady Amid Rising Inflation and Iran War Uncertainty In a critical meeting set against the backdrop of escalating geopolitical tensions, Federal Reserve...

Uganda Strengthens Copyright Protections as Parliament Passes Landmark Amendment Bill

Uganda Strengthens Copyright Protections as Parliament Passes Landmark Amendment Bill On March 17, 2026, the Ugandan Parliament made a significant stride in enhancing the rights...