Unrated severityNVD Advisory· Published Jul 9, 2025· Updated Jul 10, 2025
Exposure of password hashes via API responses in ConnectWise PSA
CVE-2025-7204
Description
In ConnectWise PSA versions older than 2025.9, a vulnerability exists where authenticated users could gain access to sensitive user information. Specific API requests were found to return an overly verbose user object, which included encrypted password hashes for other users. Authenticated users could then retrieve these hashes.
An attacker or privileged user could then use these exposed hashes to conduct offline brute-force or dictionary attacks. Such attacks could lead to credential compromise, allowing unauthorized access to accounts, and potentially privilege escalation within the system.
Affected products
2- Range: <2025.9
- ConnectWise/PSAv5Range: All versions prior to 2025.9
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.connectwise.com/company/trust/security-bulletins/connectwise-psa-2025.9-security-fixmitrevendor-advisory
- www.themissinglink.com.au/security-advisories/cve-2025-7204mitrethird-party-advisory
News mentions
0No linked articles in our index yet.