{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-40537","assignerOrgId":"49f11609-934d-4621-84e6-e02e032104d6","state":"PUBLISHED","assignerShortName":"SolarWinds","dateReserved":"2025-04-16T08:00:57.647Z","datePublished":"2026-01-28T07:31:41.994Z","dateUpdated":"2026-02-26T15:04:49.393Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Web Help Desk","vendor":"SolarWinds","versions":[{"status":"affected","version":"12.8.8 HF1 and below"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Jimi Sebree working with Horizon3.ai"}],"datePublic":"2026-01-28T07:31:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions."}],"value":"SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions."}],"impacts":[{"capecId":"CAPEC-70","descriptions":[{"lang":"en","value":"CAPEC-70 Try Common or Default Usernames and Passwords"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-798","description":"CWE-798 Use of Hard-coded Credentials","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"49f11609-934d-4621-84e6-e02e032104d6","shortName":"SolarWinds","dateUpdated":"2026-01-28T07:31:41.994Z"},"references":[{"tags":["vendor-advisory","patch"],"url":"https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40537"},{"tags":["release-notes"],"url":"https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"SolarWinds recommends customers upgrade to Web Help Desk version 2026.1, and to follow the steps in the guide to unlink the demo client from the admin user. The guide can be found in the release notes and the Web Help Desk Secure Configuration guide, which can be found here:&nbsp;<a target=\"_blank\" rel=\"nofollow\" href=\"https://documentation.solarwinds.com/en/success_center/whd/content/helpdesksecureconfiguration.htm\">https://documentation.solarwinds.com/en/success_center/whd/content/helpdesksecureconfiguration.htm</a>.<br>"}],"value":"SolarWinds recommends customers upgrade to Web Help Desk version 2026.1, and to follow the steps in the guide to unlink the demo client from the admin user. The guide can be found in the release notes and the Web Help Desk Secure Configuration guide, which can be found here:  https://documentation.solarwinds.com/en/success_center/whd/content/helpdesksecureconfiguration.htm https://documentation.solarwinds.com/en/success_center/whd/content/helpdesksecureconfiguration.htm ."}],"source":{"discovery":"EXTERNAL"},"title":"SolarWinds Web Help Desk Hardcoded Credentials Vulnerability","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-40537","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-02-03T04:55:33.662870Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:04:49.393Z"}}]}}