Skip to main content

CVE-2025-7204: CWE-201 Insertion of Sensitive Information Into Sent Data in ConnectWise PSA

Medium
VulnerabilityCVE-2025-7204cvecve-2025-7204cwe-201
Published: Wed Jul 09 2025 (07/09/2025, 14:50:36 UTC)
Source: CVE Database V5
Vendor/Project: ConnectWise
Product: PSA

Description

In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes.  An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.

AI-Powered Analysis

AILast updated: 07/16/2025, 21:02:55 UTC

Technical Analysis

CVE-2025-7204 is a vulnerability identified in ConnectWise PSA versions prior to 2025.9. The issue involves the insertion of sensitive information into sent data, specifically through API responses that return an overly verbose user object. Authenticated users making certain API requests can retrieve encrypted password hashes belonging to other users within the system. This exposure of password hashes constitutes a CWE-201 vulnerability, where sensitive information is inappropriately included in transmitted data. Although the hashes are encrypted, an attacker or a privileged user with valid authentication can perform offline brute-force or dictionary attacks against these hashes to attempt to recover plaintext credentials. Successful compromise of user credentials could lead to unauthorized access to user accounts and potentially enable privilege escalation within the ConnectWise PSA environment. The vulnerability does not require user interaction and can be exploited remotely over the network by any authenticated user with low attack complexity. The CVSS v3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches are linked yet, indicating that organizations using affected versions should prioritize mitigation and monitoring.

Potential Impact

For European organizations utilizing ConnectWise PSA, this vulnerability poses a significant risk to the confidentiality of user credentials. As ConnectWise PSA is widely used by managed service providers (MSPs) and IT service organizations, a compromise could cascade to multiple client environments managed through the platform. Credential compromise could allow attackers to impersonate legitimate users, access sensitive customer data, and potentially escalate privileges to administrative levels within the PSA system. This could disrupt service management workflows, expose sensitive business and client information, and undermine trust in service providers. Given the medium severity and the requirement for authentication, the threat is more pronounced in environments with weak internal access controls or where user credentials are shared or reused. Additionally, the ability to conduct offline attacks on password hashes increases the risk over time, especially if strong password policies are not enforced. The lack of impact on integrity and availability means the system’s operations may continue uninterrupted while confidentiality is silently compromised, making detection more difficult.

Mitigation Recommendations

European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, upgrade ConnectWise PSA to version 2025.9 or later as soon as an official patch is available. Until then, restrict API access to trusted users only and enforce the principle of least privilege to limit authenticated users' ability to make API calls that return user objects. Implement strong password policies with high complexity and length requirements to reduce the effectiveness of offline brute-force attacks on exposed hashes. Enable multi-factor authentication (MFA) for all users to mitigate the risk of credential compromise leading to unauthorized access. Monitor API usage logs for unusual or excessive requests that could indicate attempts to enumerate user hashes. Conduct regular audits of user permissions and remove unnecessary privileged accounts. Consider network segmentation to isolate the PSA system and reduce exposure. Finally, educate users about the risks of credential reuse and encourage regular password changes to limit the window of opportunity for attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ConnectWise
Date Reserved
2025-07-07T11:30:08.002Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 686e862c6f40f0eb72047eb0

Added to database: 7/9/2025, 3:09:32 PM

Last enriched: 7/16/2025, 9:02:55 PM

Last updated: 8/29/2025, 7:58:48 PM

Views: 39

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats