CVE-2025-7204: CWE-201 Insertion of Sensitive Information Into Sent Data in ConnectWise PSA
In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes. An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.
AI Analysis
Technical Summary
CVE-2025-7204 is a vulnerability identified in ConnectWise PSA versions prior to 2025.9. The issue involves the insertion of sensitive information into sent data, specifically through API responses that return an overly verbose user object. Authenticated users making certain API requests can retrieve encrypted password hashes belonging to other users within the system. This exposure of password hashes constitutes a CWE-201 vulnerability, where sensitive information is inappropriately included in transmitted data. Although the hashes are encrypted, an attacker or a privileged user with valid authentication can perform offline brute-force or dictionary attacks against these hashes to attempt to recover plaintext credentials. Successful compromise of user credentials could lead to unauthorized access to user accounts and potentially enable privilege escalation within the ConnectWise PSA environment. The vulnerability does not require user interaction and can be exploited remotely over the network by any authenticated user with low attack complexity. The CVSS v3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches are linked yet, indicating that organizations using affected versions should prioritize mitigation and monitoring.
Potential Impact
For European organizations utilizing ConnectWise PSA, this vulnerability poses a significant risk to the confidentiality of user credentials. As ConnectWise PSA is widely used by managed service providers (MSPs) and IT service organizations, a compromise could cascade to multiple client environments managed through the platform. Credential compromise could allow attackers to impersonate legitimate users, access sensitive customer data, and potentially escalate privileges to administrative levels within the PSA system. This could disrupt service management workflows, expose sensitive business and client information, and undermine trust in service providers. Given the medium severity and the requirement for authentication, the threat is more pronounced in environments with weak internal access controls or where user credentials are shared or reused. Additionally, the ability to conduct offline attacks on password hashes increases the risk over time, especially if strong password policies are not enforced. The lack of impact on integrity and availability means the system’s operations may continue uninterrupted while confidentiality is silently compromised, making detection more difficult.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, upgrade ConnectWise PSA to version 2025.9 or later as soon as an official patch is available. Until then, restrict API access to trusted users only and enforce the principle of least privilege to limit authenticated users' ability to make API calls that return user objects. Implement strong password policies with high complexity and length requirements to reduce the effectiveness of offline brute-force attacks on exposed hashes. Enable multi-factor authentication (MFA) for all users to mitigate the risk of credential compromise leading to unauthorized access. Monitor API usage logs for unusual or excessive requests that could indicate attempts to enumerate user hashes. Conduct regular audits of user permissions and remove unnecessary privileged accounts. Consider network segmentation to isolate the PSA system and reduce exposure. Finally, educate users about the risks of credential reuse and encourage regular password changes to limit the window of opportunity for attackers.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Ireland, Belgium
CVE-2025-7204: CWE-201 Insertion of Sensitive Information Into Sent Data in ConnectWise PSA
Description
In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes. An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-7204 is a vulnerability identified in ConnectWise PSA versions prior to 2025.9. The issue involves the insertion of sensitive information into sent data, specifically through API responses that return an overly verbose user object. Authenticated users making certain API requests can retrieve encrypted password hashes belonging to other users within the system. This exposure of password hashes constitutes a CWE-201 vulnerability, where sensitive information is inappropriately included in transmitted data. Although the hashes are encrypted, an attacker or a privileged user with valid authentication can perform offline brute-force or dictionary attacks against these hashes to attempt to recover plaintext credentials. Successful compromise of user credentials could lead to unauthorized access to user accounts and potentially enable privilege escalation within the ConnectWise PSA environment. The vulnerability does not require user interaction and can be exploited remotely over the network by any authenticated user with low attack complexity. The CVSS v3.1 base score is 6.5 (medium severity), reflecting high confidentiality impact but no impact on integrity or availability. No known exploits are currently reported in the wild, and no official patches are linked yet, indicating that organizations using affected versions should prioritize mitigation and monitoring.
Potential Impact
For European organizations utilizing ConnectWise PSA, this vulnerability poses a significant risk to the confidentiality of user credentials. As ConnectWise PSA is widely used by managed service providers (MSPs) and IT service organizations, a compromise could cascade to multiple client environments managed through the platform. Credential compromise could allow attackers to impersonate legitimate users, access sensitive customer data, and potentially escalate privileges to administrative levels within the PSA system. This could disrupt service management workflows, expose sensitive business and client information, and undermine trust in service providers. Given the medium severity and the requirement for authentication, the threat is more pronounced in environments with weak internal access controls or where user credentials are shared or reused. Additionally, the ability to conduct offline attacks on password hashes increases the risk over time, especially if strong password policies are not enforced. The lack of impact on integrity and availability means the system’s operations may continue uninterrupted while confidentiality is silently compromised, making detection more difficult.
Mitigation Recommendations
European organizations should take immediate steps to mitigate this vulnerability beyond generic patching advice. First, upgrade ConnectWise PSA to version 2025.9 or later as soon as an official patch is available. Until then, restrict API access to trusted users only and enforce the principle of least privilege to limit authenticated users' ability to make API calls that return user objects. Implement strong password policies with high complexity and length requirements to reduce the effectiveness of offline brute-force attacks on exposed hashes. Enable multi-factor authentication (MFA) for all users to mitigate the risk of credential compromise leading to unauthorized access. Monitor API usage logs for unusual or excessive requests that could indicate attempts to enumerate user hashes. Conduct regular audits of user permissions and remove unnecessary privileged accounts. Consider network segmentation to isolate the PSA system and reduce exposure. Finally, educate users about the risks of credential reuse and encourage regular password changes to limit the window of opportunity for attackers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ConnectWise
- Date Reserved
- 2025-07-07T11:30:08.002Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686e862c6f40f0eb72047eb0
Added to database: 7/9/2025, 3:09:32 PM
Last enriched: 7/16/2025, 9:02:55 PM
Last updated: 8/29/2025, 7:58:48 PM
Views: 39
Related Threats
CVE-2025-9764: SQL Injection in itsourcecode Sports Management System
MediumCVE-2025-54857: Improper neutralization of special elements used in an OS command ('OS Command Injection') in Seiko Solutions Inc. SkyBridge BASIC MB-A130
CriticalCVE-2025-9763: SQL Injection in Campcodes Online Learning Management System
MediumCVE-2025-6507: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
CriticalCVE-2025-20708: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6833P, MT6835, MT6835T, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6878, MT6878M, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6895TT, MT6896, MT6897, MT6899, MT6980, MT6980D, MT6983, MT6983T, MT6985, MT6985T, MT6989, MT6989T, MT6990, MT6991, MT8673, MT8675, MT8676, MT8678, MT8771, MT8791, MT8791T, MT8792, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.