{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T03:08:14.783","vulnerabilities":[{"cve":{"id":"CVE-2025-40541","sourceIdentifier":"psirt@solarwinds.com","published":"2026-02-24T08:16:28.220","lastModified":"2026-02-24T17:56:16.030","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An Insecure Direct Object Reference (IDOR) vulnerability exists in Serv-U, which when exploited, gives a malicious actor the ability to execute native code as a privileged account.\n\nThis issue requires administrative privileges to abuse. On Windows deployments, the risk is scored as a medium because services frequently run under less-privileged service accounts by default."},{"lang":"es","value":"Hay una vulnerabilidad de tipo Insecure Direct Object Reference (IDOR) en Serv-U que, al ser explotada, otorga a un actor malicioso la capacidad de ejecutar código nativo como una cuenta privilegiada.\n\nPara se explotada, este problema requiere privilegios de administrador. En implementaciones de Windows, el riesgo se califica como medio porque los servicios, con frecuencia, se ejecutan bajo cuentas de servicio menos privilegiadas por defecto."}],"metrics":{"cvssMetricV31":[{"source":"psirt@solarwinds.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@solarwinds.com","type":"Primary","description":[{"lang":"en","value":"CWE-704"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-639"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:solarwinds:serv-u:*:*:*:*:*:*:*:*","versionEndExcluding":"15.5.4","matchCriteriaId":"0879DDA2-3F57-41C7-A689-4B904310687E"}]}]}],"references":[{"url":"https://documentation.solarwinds.com/en/success_center/servu/content/release_notes/servu_15-5-4_release_notes.htm","source":"psirt@solarwinds.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40541","source":"psirt@solarwinds.com","tags":["Vendor Advisory"]}]}}]}