A Path Restriction Bypass vulnerability exists in Serv-U that when abused, could give a malicious actor with access to admin privileges the ability to execute code on a directory. This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled.
History

Tue, 18 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Solarwinds
Solarwinds serv-u
Vendors & Products Microsoft
Microsoft windows
Solarwinds
Solarwinds serv-u

Tue, 18 Nov 2025 09:00:00 +0000

Type Values Removed Values Added
Description A Path Restriction Bypass vulnerability exists in Serv-U that when abused, could give a malicious actor with access to admin privileges the ability to execute code on a directory. This issue requires administrative privileges to abuse. On Windows systems, this scored as medium due to differences in how paths and home directories are handled.
Title SolarWinds Serv-U Path Restriction Bypass Vulnerability
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published: 2025-11-18T08:41:24.582Z

Updated: 2025-11-19T04:55:21.438Z

Reserved: 2025-04-16T08:01:25.942Z

Link: CVE-2025-40549

cve-icon Vulnrichment

Updated: 2025-11-18T14:16:39.713Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-18T09:15:52.347

Modified: 2025-11-18T14:06:29.817

Link: CVE-2025-40549

cve-icon Redhat

No data.