CVE-2025-7204

Exposure of password hashes via API responses in ConnectWise PSA

Description

In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes.  An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.

Remediation

Solution:

  • Cloud: Cloud instances are automatically being updated to the latest ConnectWise PSA release.  On-Premise: Apply the 2025.9 release patches and ensure all desktop clients are up to date.

Category

6.5
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.04%
Vendor Advisory connectwise.com
Affected: ConnectWise PSA
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2025-7204?
CVE-2025-7204 has been scored as a medium severity vulnerability.
How to fix CVE-2025-7204?
To fix CVE-2025-7204: Cloud: Cloud instances are automatically being updated to the latest ConnectWise PSA release.  On-Premise: Apply the 2025.9 release patches and ensure all desktop clients are up to date.
Is CVE-2025-7204 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2025-7204 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2025-7204?
CVE-2025-7204 affects ConnectWise PSA.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.