Automate Connectwise Automate

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Connectwise Automate.

By the Year

In 2026 there have been 0 vulnerabilities in Connectwise Automate. Last year, in 2025 Automate had 2 security vulnerabilities published. Right now, Automate is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 2 9.20
2024 2 6.80
2023 2 6.00
2022 0 0.00
2021 1 9.80
2020 1 8.80

It may take a day or so for new Automate vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Connectwise Automate Security Vulnerabilities

ConnectWise Automate Agent MITM File Integrity Flaw
CVE-2025-11493 8.8 - High - October 16, 2025

The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitute malicious files for legitimate ones by impersonating a legitimate server. This risk is mitigated when HTTPS is enforced and is related to CVE-2025-11492.

Download of Code Without Integrity Check

ConnectWise Automate Agent: HTTP Channel Exposes Traffic (CVE-2025-11492)
CVE-2025-11492 9.6 - Critical - October 16, 2025

In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.

Cleartext Transmission of Sensitive Information

ConnectWise ScreenConnect <=23.8.4 RCE via MITM in Messaging
CVE-2023-47257 8.1 - High - February 01, 2024

ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.

Code Injection

ScreenConnect 23.8.4 Local Users Connect to Arbitrary Relay via Proxy Trust
CVE-2023-47256 5.5 - Medium - February 01, 2024

ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings

authentification

ConnectWise Automate 2022.11 Cleartext Auth via HTTP (CVE-2023-23130)
CVE-2023-23130 5.9 - Medium - February 01, 2023

Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.

Cleartext Transmission of Sensitive Information

ConnectWise Automate 2022.11 Clickjacking via Iframed Login CSP Claim
CVE-2023-23126 6.1 - Medium - February 01, 2023

Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.

Clickjacking

An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
CVE-2021-35066 9.8 - Critical - June 21, 2021

An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.

XXE

The Agent Update System in ConnectWise Automate before 2020.8
CVE-2020-15838 8.8 - High - October 09, 2020

The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.

authentification

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Connectwise Automate or by Connectwise? Click the Watch button to subscribe.

Connectwise
Vendor

subscribe