CVE-2025-40547
SolarWinds Serv-U Logic Abuse - Remote Code Execution Vulnerability
CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th
A logic error vulnerability exists in Serv-U which when abused could give a malicious actor with access to admin privileges the ability to execute code. This issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default.
| CWE | CWE-116 |
| Vendor | solarwinds |
| Product | serv-u |
| Published | Nov 18, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for solarwinds serv-u
Be the first to know when new critical vulnerabilities affecting solarwinds serv-u are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
SolarWinds / Serv-U
SolarWinds Serv-U 15.5.2 and prior versions
References
Credits
๐ SolarWinds would like to thank researchers working with Intigriti on our bug bounty program