A Path Restriction Bypass vulnerability exists in Serv-U that when abused, could give a malicious actor with access to admin privileges the ability to execute code on a directory.
This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled.
References
| Link | Resource |
|---|---|
| https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-3_release_notes.htm | Release Notes |
| https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40549 | Patch Vendor Advisory |
Configurations
History
02 Dec 2025, 16:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Solarwinds
Solarwinds serv-u |
|
| CPE | cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:* | |
| References | () https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-3_release_notes.htm - Release Notes | |
| References | () https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40549 - Patch, Vendor Advisory |
18 Nov 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-18 09:15
Updated : 2025-12-02 16:37
NVD link : CVE-2025-40549
Mitre link : CVE-2025-40549
CVE.ORG link : CVE-2025-40549
JSON object : View
Products Affected
solarwinds
- serv-u
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
