A Path Restriction Bypass vulnerability exists in Serv-U that when abused, could give a malicious actor with access to admin privileges the ability to execute code on a directory.
This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled.
This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
SolarWinds recommends that customers upgrade to SolarWinds Serv-U 15.5.3 as soon as it becomes available.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Nov 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Path Restriction Bypass vulnerability exists in Serv-U that when abused, could give a malicious actor with access to admin privileges the ability to execute code on a directory. This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled. | |
| Title | SolarWinds Serv-U Path Restriction Bypass Vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2025-11-18T08:41:24.582Z
Reserved: 2025-04-16T08:01:25.942Z
Link: CVE-2025-40549
No data.
Status : Received
Published: 2025-11-18T09:15:52.347
Modified: 2025-11-18T09:15:52.347
Link: CVE-2025-40549
No data.
OpenCVE Enrichment
No data.