This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled.
Project Subscriptions
No advisories yet.
Solution
SolarWinds recommends that customers upgrade to SolarWinds Serv-U 15.5.3 as soon as it becomes available.
Workaround
No workaround given by the vendor.
Tue, 02 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:* |
Tue, 18 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Solarwinds Solarwinds serv-u |
|
| Vendors & Products |
Microsoft
Microsoft windows Solarwinds Solarwinds serv-u |
Tue, 18 Nov 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Path Restriction Bypass vulnerability exists in Serv-U that when abused, could give a malicious actor with access to admin privileges the ability to execute code on a directory. This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled. | |
| Title | SolarWinds Serv-U Path Restriction Bypass Vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2025-11-19T04:55:21.438Z
Reserved: 2025-04-16T08:01:25.942Z
Link: CVE-2025-40549
Updated: 2025-11-18T14:16:39.713Z
Status : Analyzed
Published: 2025-11-18T09:15:52.347
Modified: 2025-12-02T16:37:16.883
Link: CVE-2025-40549
No data.
OpenCVE Enrichment
Updated: 2025-11-18T14:15:56Z