Cyber Posture

CVE-2025-40537

High

Published: 28 January 2026

Published
28 January 2026
Modified
03 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-40537 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Solarwinds Web Help Desk. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Valid Accounts (T1078); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Valid Accounts (T1078) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-798

Enables users to notice when hard-coded credentials have been exploited for unauthorized access.

addresses: CWE-798

Security training explicitly warns against hard-coded credentials, lowering their use in systems.

addresses: CWE-798

Policy and procedures prohibit hard-coded credentials in favor of managed authentication.

addresses: CWE-798

External identity providers eliminate the need for hard-coded credentials in applications.

addresses: CWE-798

Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.

addresses: CWE-798

Central credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.

addresses: CWE-798

Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.

addresses: CWE-798

Planned investment enables secure credential storage and management systems instead of hard-coded credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1078 Valid Accounts Stealth
Adversaries may obtain and abuse credentials of existing accounts as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Hardcoded credentials (CWE-798) directly provide valid accounts for admin access and represent unsecured credentials stored in the application.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SolarWinds Web Help Desk was found to be susceptible to a hardcoded credentials vulnerability that, under certain situations, could allow access to administrative functions.

Deeper analysisAI

CVE-2025-40537, published on 2026-01-28, is a hardcoded credentials vulnerability (CWE-798) affecting SolarWinds Web Help Desk. The issue could allow access to administrative functions under certain situations. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating network accessibility, high attack complexity, low privilege requirements, no user interaction, unchanged scope, and high impacts on confidentiality, integrity, and availability.

An authenticated attacker with low privileges can exploit this vulnerability over the network if they satisfy the high attack complexity conditions. Successful exploitation enables access to administrative functions, resulting in high-level compromise of confidentiality, integrity, and availability.

SolarWinds provides mitigation guidance in its security advisory at https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40537 and the Web Help Desk 2026.1 release notes at https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm.

Details

CWE(s)

Affected Products

solarwinds
web help desk
≤ 2026.1

CVEs Like This One

CVE-2025-40553Same product: Solarwinds Web Help Desk
CVE-2025-40552Same product: Solarwinds Web Help Desk
CVE-2025-40536Same product: Solarwinds Web Help Desk
CVE-2024-28988Same product: Solarwinds Web Help Desk
CVE-2025-26399Same product: Solarwinds Web Help Desk
CVE-2025-40554Same product: Solarwinds Web Help Desk
CVE-2025-40551Same product: Solarwinds Web Help Desk
CVE-2024-52606Same product class: network monitoring / SIEM
CVE-2025-40538Same product class: network monitoring / SIEM
CVE-2025-40539Same product class: network monitoring / SIEM

References