Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
SolarWinds recommends customers upgrade to SolarWinds Platform 2025.1 as soon as it becomes available.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-4989 | SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request. |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 25 Feb 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Solarwinds
Solarwinds solarwinds Platform |
|
| CPEs | cpe:2.3:a:solarwinds:solarwinds_platform:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Solarwinds
Solarwinds solarwinds Platform |
Tue, 11 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 11 Feb 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolarWinds Platform is affected by server-side request forgery vulnerability. Proper input sanitation was not applied allowing for the possibility of a malicious web request. | |
| Title | SolarWinds Platform Server-Side Request Forgery Vulnerability | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: SolarWinds
Published:
Updated: 2025-02-11T15:25:40.184Z
Reserved: 2024-11-14T20:40:33.286Z
Link: CVE-2024-52606
Updated: 2025-02-11T15:25:08.211Z
Status : Analyzed
Published: 2025-02-11T08:15:31.133
Modified: 2025-02-25T17:35:43.813
Link: CVE-2024-52606
No data.
OpenCVE Enrichment
No data.
EUVD