Cyber Posture

CVE-2026-0695

High

Published: 16 January 2026

Published
16 January 2026
Modified
27 January 2026
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
EPSS Score 0.0001 3.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0695 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Connectwise Professional Service Automation. Its CVSS base score is 8.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Browser Session Hijacking (T1185); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Browser Session Hijacking (T1185) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates filtering and encoding of information output, such as Time Entry notes in the Audit Trail, to prevent execution of stored malicious scripts in users' browsers.

prevent

Requires validation of user inputs like Time Entry notes to detect and reject malicious script content before storage in the Audit Trail.

prevent

Ensures timely identification, reporting, and remediation of flaws like the output encoding deficiency fixed in ConnectWise PSA version 2026.1.

MITRE ATT&CK Enterprise TechniquesAI

T1185 Browser Session Hijacking Collection
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.
T1539 Steal Web Session Cookie Credential Access
An adversary may steal web application or service session cookies and use them to gain access to web applications or Internet services as an authenticated user without needing credentials.
Why these techniques?

Stored XSS directly enables browser script execution for session hijacking and web cookie theft as described.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

In ConnectWise PSA versions older than 2026.1, Time Entry notes stored in the Time Entry Audit Trail may be rendered without applying output encoding to certain content. Under specific conditions, this may allow stored script code to execute in the…

more

context of a user’s browser when the affected content is displayed.

Deeper analysisAI

CVE-2026-0695 is a stored cross-site scripting (XSS) vulnerability, classified under CWE-79, affecting ConnectWise PSA versions older than 2026.1. The flaw occurs in the Time Entry Audit Trail, where Time Entry notes are rendered without applying output encoding to certain content. Under specific conditions, this allows stored script code to execute in the context of a user's browser when the affected content is displayed. The vulnerability carries a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to network accessibility, low attack complexity, and significant confidentiality and integrity impacts.

Exploitation requires an attacker to have low privileges (PR:L), such as a legitimate user with the ability to create or edit Time Entry notes. The attacker injects malicious script into these notes, which are then stored in the Audit Trail. A victim user must interact by viewing the affected Audit Trail content (UI:R), triggering script execution in their browser context. This achieves high confidentiality and integrity effects (C:H/I:H) with a changed scope (S:C), potentially allowing session hijacking, data theft, or unauthorized actions on the victim's behalf.

ConnectWise addressed the issue with a security fix in PSA version 2026.1, as detailed in their security bulletin at https://www.connectwise.com/company/trust/security-bulletins/2026-01-15-psa-security-fix. Additional guidance is available in the advisory from The Missing Link at https://www.themissinglink.com.au/security-advisories/cve-2026-0695. Practitioners should prioritize upgrading affected instances and review these resources for full mitigation details.

Details

CWE(s)

Affected Products

connectwise
professional service automation
≤ 2026.1

CVEs Like This One

CVE-2026-27070Shared CWE-79
CVE-2026-4108Shared CWE-79
CVE-2025-23429Shared CWE-79
CVE-2025-26585Shared CWE-79
CVE-2026-32277Shared CWE-79
CVE-2026-34560Shared CWE-79
CVE-2026-30919Shared CWE-79
CVE-2025-0475Shared CWE-79
CVE-2025-23845Shared CWE-79
CVE-2025-63611Shared CWE-79

References