A missing validation process exists in Serv U when abused, could give a malicious actor with access to admin privileges the ability to execute code.
This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
References
| Link | Resource |
|---|---|
| https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-3_release_notes.htm | Release Notes |
| https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40548 | Patch Vendor Advisory |
Configurations
History
02 Dec 2025, 16:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:* | |
| First Time |
Solarwinds
Solarwinds serv-u |
|
| References | () https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-3_release_notes.htm - Release Notes | |
| References | () https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40548 - Patch, Vendor Advisory |
18 Nov 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 09:15
Updated : 2025-12-02 16:36
NVD link : CVE-2025-40548
Mitre link : CVE-2025-40548
CVE.ORG link : CVE-2025-40548
JSON object : View
Products Affected
solarwinds
- serv-u
CWE
CWE-269
Improper Privilege Management
