CVE-2025-40548

A missing validation process exists in Serv U when abused, could give a malicious actor with access to admin privileges the ability to execute code. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
Configurations

Configuration 1 (hide)

cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*

History

02 Dec 2025, 16:36

Type Values Removed Values Added
CPE cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*
First Time Solarwinds
Solarwinds serv-u
References () https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-3_release_notes.htm - () https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-3_release_notes.htm - Release Notes
References () https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40548 - () https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40548 - Patch, Vendor Advisory

18 Nov 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 09:15

Updated : 2025-12-02 16:36


NVD link : CVE-2025-40548

Mitre link : CVE-2025-40548

CVE.ORG link : CVE-2025-40548


JSON object : View

Products Affected

solarwinds

  • serv-u
CWE
CWE-269

Improper Privilege Management