Connectwise Automate
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Connectwise Automate.
By the Year
In 2026 there have been 0 vulnerabilities in Connectwise Automate. Last year, in 2025 Automate had 2 security vulnerabilities published. Right now, Automate is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 9.20 |
| 2024 | 2 | 6.80 |
| 2023 | 2 | 6.00 |
| 2022 | 0 | 0.00 |
| 2021 | 1 | 9.80 |
| 2020 | 1 | 8.80 |
It may take a day or so for new Automate vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Connectwise Automate Security Vulnerabilities
ConnectWise Automate Agent MITM File Integrity Flaw
CVE-2025-11493
8.8 - High
- October 16, 2025
The ConnectWise Automate Agent does not fully verify the authenticity of files downloaded from the server, such as updates, dependencies, and integrations. This creates a risk where an on-path attacker could perform a man-in-the-middle attack and substitute malicious files for legitimate ones by impersonating a legitimate server. This risk is mitigated when HTTPS is enforced and is related to CVE-2025-11492.
Download of Code Without Integrity Check
ConnectWise Automate Agent: HTTP Channel Exposes Traffic (CVE-2025-11492)
CVE-2025-11492
9.6 - Critical
- October 16, 2025
In the ConnectWise Automate Agent, communications could be configured to use HTTP instead of HTTPS. In such cases, an on-path threat actor with a man-in-the-middle network position could intercept, modify, or replay agent-server traffic. Additionally, the encryption method used to obfuscate some communications over the HTTP channel is updated in the Automate 2025.9 patch to enforce HTTPS for all agent communications.
Cleartext Transmission of Sensitive Information
ConnectWise ScreenConnect <=23.8.4 RCE via MITM in Messaging
CVE-2023-47257
8.1 - High
- February 01, 2024
ConnectWise ScreenConnect through 23.8.4 allows man-in-the-middle attackers to achieve remote code execution via crafted messages.
Code Injection
ScreenConnect 23.8.4 Local Users Connect to Arbitrary Relay via Proxy Trust
CVE-2023-47256
5.5 - Medium
- February 01, 2024
ConnectWise ScreenConnect through 23.8.4 allows local users to connect to arbitrary relay servers via implicit trust of proxy settings
authentification
ConnectWise Automate 2022.11 Cleartext Auth via HTTP (CVE-2023-23130)
CVE-2023-23130
5.9 - Medium
- February 01, 2023
Connectwise Automate 2022.11 is vulnerable to Cleartext authentication. Authentication is being done via HTTP (cleartext) with SSL disabled. OTE: the vendor's position is that, by design, this is controlled by a configuration option in which a customer can choose to use HTTP (rather than HTTPS) during troubleshooting.
Cleartext Transmission of Sensitive Information
ConnectWise Automate 2022.11 Clickjacking via Iframed Login CSP Claim
CVE-2023-23126
6.1 - Medium
- February 01, 2023
Connectwise Automate 2022.11 is vulnerable to Clickjacking. The login screen can be iframed and used to manipulate users to perform unintended actions. NOTE: the vendor's position is that a Content-Security-Policy HTTP response header is present to block this attack.
Clickjacking
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
CVE-2021-35066
9.8 - Critical
- June 21, 2021
An XXE vulnerability exists in ConnectWise Automate before 2021.0.6.132.
XXE
The Agent Update System in ConnectWise Automate before 2020.8
CVE-2020-15838
8.8 - High
- October 09, 2020
The Agent Update System in ConnectWise Automate before 2020.8 allows Privilege Escalation because the _LTUPDATE folder has weak permissions.
authentification
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Connectwise Automate or by Connectwise? Click the Watch button to subscribe.