In versions of ScreenConnectâ„¢ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects only the ScreenConnect server component; host and guest clients are not impacted. ScreenConnect 25.8 introduces enhanced server-side configuration handling and integrity checks to ensure only trusted extensions can be installed.
History

Thu, 11 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Connectwise
Connectwise screenconnect
Vendors & Products Connectwise
Connectwise screenconnect

Thu, 11 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 11 Dec 2025 14:45:00 +0000

Type Values Removed Values Added
Description In versions of ScreenConnectâ„¢ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects only the ScreenConnect server component; host and guest clients are not impacted. ScreenConnect 25.8 introduces enhanced server-side configuration handling and integrity checks to ensure only trusted extensions can be installed.
Title Improper server-side validation in ScreenConnect extension framework
Weaknesses CWE-494
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ConnectWise

Published: 2025-12-11T14:21:53.234Z

Updated: 2025-12-11T21:19:13.087Z

Reserved: 2025-12-08T12:25:20.291Z

Link: CVE-2025-14265

cve-icon Vulnrichment

Updated: 2025-12-11T14:43:51.951Z

cve-icon NVD

Status : Received

Published: 2025-12-11T15:15:46.863

Modified: 2025-12-11T15:15:46.863

Link: CVE-2025-14265

cve-icon Redhat

No data.