In versions of ScreenConnectâ„¢ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects only the ScreenConnect server component; host and guest clients are not impacted. ScreenConnect 25.8 introduces enhanced server-side configuration handling and integrity checks to ensure only trusted extensions can be installed.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Connectwise
Connectwise screenconnect |
|
| Vendors & Products |
Connectwise
Connectwise screenconnect |
Thu, 11 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In versions of ScreenConnectâ„¢ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects only the ScreenConnect server component; host and guest clients are not impacted. ScreenConnect 25.8 introduces enhanced server-side configuration handling and integrity checks to ensure only trusted extensions can be installed. | |
| Title | Improper server-side validation in ScreenConnect extension framework | |
| Weaknesses | CWE-494 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ConnectWise
Published: 2025-12-11T14:21:53.234Z
Updated: 2025-12-11T21:19:13.087Z
Reserved: 2025-12-08T12:25:20.291Z
Link: CVE-2025-14265
Updated: 2025-12-11T14:43:51.951Z
Status : Received
Published: 2025-12-11T15:15:46.863
Modified: 2025-12-11T15:15:46.863
Link: CVE-2025-14265
No data.