Security Patch: SolarWinds Web Help Desk Authentication Bypass
The ticketing software SolarWinds Web Help Desk is vulnerable through four critical security vulnerabilities, among others.
(Image: Alfa Photo/Shutterstock.com)
Multiple software vulnerabilities threaten systems with the SolarWinds Web Help Desk. If attackers successfully exploit the vulnerabilities, they could, in the worst case, completely compromise systems. A patched version is available for download.
Multiple Vulnerabilities
In a post about the patched version WHD 2026.1, security vulnerabilities (CVE-2025-40536 “high”, CVE-2025-40537 “high”, CVE-2025-40551 “critical”, CVE-2025-40552 “critical”, CVE-2025-40553 “critical”, CVE-2025-40554 “critical”) are listed among others. Admins should ensure they install the patched version promptly. Failure to do so could allow attackers to gain full control over systems after successful attacks.
Through two critical vulnerabilities, attackers can execute malicious code on host systems. The remaining two critical vulnerabilities affect authentication, and attackers can execute certain commands, which should only be allowed for logged-in users.
How attacks can unfold in detail is not yet known. It is also unclear at which parameters admins can identify already attacked systems. Currently, there are no indications in the warning message that attackers are already exploiting the vulnerabilities.
Further Fixes
Furthermore, according to the developers, several bugs have been fixed in the current version. For example, encryption errors will no longer occur in FIPS environments. However, there are still unresolved issues. Currently, Linux and macOS support is not provided due to Next.js problems.
Videos by heise
Additionally, the developers have graphically revised the interface. The selection of the new interface is optional.
(des)