Cyber Posture

CVE-2025-40541

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
24 February 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0001 1.1th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-40541 is a critical-severity Incorrect Type Conversion or Cast (CWE-704) vulnerability in Solarwinds Serv-U. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 1.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly preventing IDOR exploitation that allows privileged code execution.

prevent

Limits privileges to only those necessary, reducing the attack surface of administrative accounts required to trigger the PR:H IDOR vulnerability.

prevent

Manages privileged accounts including creation, review, and disabling of unnecessary ones, minimizing accounts able to exploit the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

IDOR enables remote native code execution as privileged account on Serv-U (public-facing service), directly mapping to public app exploitation and priv esc via code exec.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account. This issue requires administrative privileges to abuse. On Windows deployments, the risk is…

more

scored as a medium because services frequently run under less-privileged service accounts by default.

Deeper analysisAI

CVE-2025-40541 is an Insecure Direct Object Reference (IDOR) vulnerability in SolarWinds Serv-U, classified under CWE-639 and CWE-704. When exploited, it enables a malicious actor to execute native code as a privileged account. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) and was published on 2026-02-24.

Exploitation requires administrative privileges (PR:H), limiting it to attackers who have already gained high-level access within the Serv-U environment. Such an actor can trigger the issue remotely over the network (AV:N) with low attack complexity and no user interaction (UI:N), resulting in high impacts to confidentiality, integrity, and availability, along with a changed scope (S:C). On Windows deployments, the risk is rated as medium because Serv-U services typically run under less-privileged accounts by default.

SolarWinds has issued a security advisory detailing the issue at https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40541. Mitigation is available via Serv-U version 15.5.4, as outlined in the release notes at https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-4_release_notes.htm.

Details

CWE(s)

Affected Products

solarwinds
serv-u
≤ 15.5.4

CVEs Like This One

CVE-2025-40539Same product: Solarwinds Serv-U
CVE-2025-40540Same product: Solarwinds Serv-U
CVE-2025-40538Same product: Solarwinds Serv-U
CVE-2025-40547Same product: Solarwinds Serv-U
CVE-2025-40549Same product: Solarwinds Serv-U
CVE-2025-40553Same product class: network monitoring / SIEM
CVE-2024-52606Same product class: network monitoring / SIEM
CVE-2025-40552Same product class: network monitoring / SIEM
CVE-2025-40536Same product class: network monitoring / SIEM
CVE-2025-26399Same product class: network monitoring / SIEM

References