Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass

Posted on January 29, 2026January 29, 2026 By CWS

A number of important vulnerabilities in SolarWinds Internet Assist Desk (WHD), culminating in unauthenticated distant code execution (RCE) through Java deserialization in CVE-2025-40551, had been uncovered by Horizon3.ai researchers.

These flaws chain static credentials, safety bypasses, and deserialization weaknesses, affecting variations previous to 2026.1.

SolarWinds WHD, an IT service administration platform for ticketing and asset monitoring, has confronted repeated deserialization points.

In 2024, CVE-2024-28986 enabled RCE through AjaxProxy and was added to CISA’s Identified Exploited Vulnerabilities catalog; patches had been bypassed by CVE-2024-28988 and CVE-2025-26399.

The most recent chain exploits comparable paths, bypassing sanitization in JSON-RPC dealing with.

Vulnerability Demo (Supply: Horizon3.ai)

The failings embrace hardcoded credentials, CSRF and request-filter bypasses, and unsafe deserialization within the jabsorb library.​

CVE IDDescriptionCVSS v3.1 ScoreImpactCVE-2025-40551Unauthenticated RCE through AjaxProxy deserialization9.8Remote command executionCVE-2025-40537Static “shopper:shopper” credentials enabling admin access7.5Unauthorized privilege escalationCVE-2025-40536Protection bypass through bogus “/ajax/” parameter8.1Access to restricted WebObjects

Attackers bypass whitelists by altering URIs from “/ajax/” to “/wo/”, create elements with “wopage”, and inject devices like JNDI lookups.​

Exploit Chain

Unauthenticated attackers begin by making a session on the login web page to extract wosid and XSRF tokens.

They bypass filters with “?badparam=/ajax/&wopage=LoginPref” to instantiate LoginPref, enabling AjaxProxy entry, then POST malicious JSON payloads through JSONRPC for deserialization.

A Nuclei template demonstrates JNDI lookup to exterior servers, confirming RCE potential.​

Monitor logs in /logs/ for exploitation indicators.​

Log TypeIOC Examplewhd-session.log“eventType=[login], accountType=[client], username=[client]”​whd.log“Whitelisted payload with matched key phrase: java..” or JSONRPC errors​Entry logsRequests to “/Helpdesk.woa/wo/*” with non-whitelisted params like “badparam=/ajax/”​

Uncommon IPs hitting restricted endpoints sign compromise.​

Improve instantly to WHD 2026.1, which addresses these points, in accordance with SolarWinds’ launch notes. Assessment configurations to disable default accounts and implement strict request filtering.

Protection exists in instruments like NodeZero; monitor CISA advisories for exploitation updates.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Bypass, Code, Critical, Execution, Remote, Security, SolarWinds, Vulnerability, Web

Post navigation

Previous Post: PwC and Google Cloud Ink $400 Million Deal to Scale AI-Powered Defense
Next Post: Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants

Related Posts

As Third-Party Vulnerabilities Rise, CISOs Accelerate Push for Security Modernization   As Third-Party Vulnerabilities Rise, CISOs Accelerate Push for Security Modernization   Cyber Security News
Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers Critical FortiClient EMS Vulnerabilities Expose 2,000 Servers Cyber Security News
VoidLink Malware Targets Kubernetes and Cloud Systems VoidLink Malware Targets Kubernetes and Cloud Systems Cyber Security News
Cybercriminals Exploit Telegram for Corporate Network Access Cybercriminals Exploit Telegram for Corporate Network Access Cyber Security News
New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways Cyber Security News
Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Multi-Staged ValleyRAT Uses WeChat and DingTalk to Attack Windows Users Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark