Critical Hotfix Released for SolarWinds Web Help Desk to Address RCE Vulnerability CVE-2025-26399

Published:

spot_img

SolarWinds Releases Critical Hotfix for Web Help Desk Vulnerability

SolarWinds has recently rolled out a hotfix aimed at addressing a significant remote code execution (RCE) vulnerability in its Web Help Desk (WHD) software. This vulnerability, now marked as CVE-2025-26399, represents the third attempt to patch an issue that initially surfaced as CVE-2024-28986. The urgency of this release highlights the importance of swift action in the realm of cybersecurity.

Understanding the Vulnerability: CVE-2025-26399

The vulnerability specifically affects Web Help Desk version 12.8.7, which is the latest iteration of the software tailored for mid-sized and large organizations. Widely utilized for managing IT support requests, automating workflows, tracking assets, and adhering to compliance requirements, the software plays a crucial role in organizational IT frameworks. The core issue lies in unsafe deserialization within the AjaxProxy component, which allows unauthenticated attackers to execute arbitrary code on the host system.

According to a security bulletin released by SolarWinds on September 23, 2025, CVE-2025-26399 is described as a patch bypass pertaining to CVE-2024-28988, which was itself a bypass of the original vulnerability CVE-2024-28986. This chain of vulnerabilities has prompted a heightened focus on cybersecurity, as each iteration introduces risks to operational integrity.

The vulnerability has been rated a critical 9.8 on the CVSS scale, indicating it poses a serious threat to systems running the affected version. Notably, the exploitation does not require user interaction or authentication, making it even more alarming for organizations relying on this software.

Hotfix Details and Installation Instructions

The new patch, Web Help Desk 12.8.7 Hotfix 1, includes several modifications to core components of the application to mitigate the deserialization issue. Affected files include:

  • whd-core.jar
  • whd-web.jar
  • whd-persistence.jar
  • HikariCP.jar (added)

Administrators seeking to apply the patch should start by stopping the WHD service. It’s crucial to back up and replace the specified .jar files located in the application’s /lib directory before restarting the system. Be aware that this hotfix is exclusively compatible with WHD version 12.8.7.

The installation process will vary based on the operating system. The default installation paths for the hotfix are as follows:

  • macOS: /Library/WebHelpDesk
  • Windows: \Program Files\WebHelpDesk
  • Linux: /usr/local/webhelpdesk

Complete installation guidelines and the hotfix package can be accessed through the SolarWinds Customer Portal. Additionally, administrators should consult the WHD 12.8.7 Hotfix 1 Administrator Guide for a comprehensive overview of deployment procedures.

Continuous Security Challenges Surrounding CVE-2025-26399

This ongoing vulnerability in SolarWinds’ software has escalated concerns within the cybersecurity community regarding the necessity for robust patch validation and quality assurance processes. While the company has taken steps to remedy this issue through successive updates, the repeated instances of bypass emphasize that the root cause may not have been adequately addressed.

SolarWinds emphasizes the critical nature of this update, encouraging customers who have installed Web Help Desk version 12.8.7 to download and apply Hotfix 1.

Organizations using WHD should also remain vigilant about aligning their installations with the software’s end-of-life (EOL) policies and upgrade paths. Recent releases have halted support for FIPS configuration files, prompting additional compliance steps for federal deployments.

Security teams leveraging SolarWinds Web Help Desk must evaluate their exposure and prioritize implementing Hotfix 1 to safeguard their systems from potential exploitation stemming from this critical vulnerability.


This article aims to provide essential information for organizations utilizing SolarWinds Web Help Desk software, emphasizing the need for prompt action in light of serious security vulnerabilities.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...