A comprehensive security testing tool for detecting and exploiting the authentication bypass vulnerability (CVE-2025-40554 / CVE-2025-40536) in SolarWinds Web Help Desk.
CVE-2025-40554 is a critical authentication bypass vulnerability in SolarWinds Web Help Desk that allows unauthenticated attackers to:
- Bypass authentication mechanisms
- Access privileged administrative functions (Authentication)
- Enumerate system configuration
Exploitation Flow:
- Session Establishment
- Connects to WHD instance
- Extracts WOSID (WebObjects Session ID) from multiple sources
- Captures XSRF token if present
- Connects to WHD instance
- Authentication Bypass
- Crafts malicious URL with WOSID injection
- Exploits path traversal in WebObjects routing
- Bypasses authentication checks
- Crafts malicious URL with WOSID injection
- Credential Testing (optional)
- Parses login form with CSRF protection
- Tests default credentials (client/client)
- Validates successful authentication
- Parses login form with CSRF protection
- Full Exploitation (--exploit mode)
- Exports session cookies
- access email, tickets, database, users, (removed)
- Exports session cookies
- externalAuthContainer
- External auth configuration
- JSONRpcClient
- API client exposure
- SAML 2.0
- SSO configuration
- LoginPref
- Login preference settings
- authMode
- Authentication mode settings



