Browse all 14 CVE security advisories affecting ConnectWise. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ConnectWise develops IT management software for MSPs, focusing on remote monitoring, ticketing, and automation solutions. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and access controls. While no major public incidents have been widely documented, the 14 CVEs on record highlight ongoing security challenges. The company's complex architecture and extensive integrations increase attack surfaces, making regular security assessments critical for users. Their software's privileged access to client networks amplifies potential impact from exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-0696 | Session Cookies Missing HttpOnly Attribute — PSACWE-1004 | 6.5 | Medium | 2026-01-16 |
| CVE-2026-0695 | Stored XSS in Time Entry Audit Trail — PSACWE-79 | 8.7 | High | 2026-01-16 |
| CVE-2025-7204 | Exposure of password hashes via API responses in ConnectWise PSA — PSACWE-201 | 6.5 | Medium | 2025-07-09 |
This page lists every published CVE security advisory associated with ConnectWise. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.