We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-7204

Exposure of password hashes via API responses in ConnectWise PSA



Description

In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes.  An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.

Reserved 2025-07-07 | Published 2025-07-09 | Updated 2025-07-10 | Assigner ConnectWise


MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-201 Insertion of Sensitive Information Into Sent Data

Product status

Default status
unaffected

All versions prior to 2025.9
affected

Credits

Michael Newton (The Missing Link) finder

References

www.connectwise.com/...s/connectwise-psa-2025.9-security-fix vendor-advisory

www.themissinglink.com.au/security-advisories/cve-2025-7204 third-party-advisory

cve.org (CVE-2025-7204)

nvd.nist.gov (CVE-2025-7204)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-7204

Support options

Helpdesk Chat, Email, Knowledgebase