{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-0695","assignerOrgId":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","state":"PUBLISHED","assignerShortName":"ConnectWise","dateReserved":"2026-01-07T21:31:57.230Z","datePublished":"2026-01-16T13:34:42.833Z","dateUpdated":"2026-01-27T12:14:38.371Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["PSA Web Application and PSA Desktop Client"],"product":"PSA","vendor":"ConnectWise","versions":[{"status":"affected","version":"All versions prior to 2026.1"}]}],"credits":[{"lang":"en","type":"finder","value":"Petar Sever (The Missing Link)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In ConnectWise PSA versions older than 2026.1, Time Entry notes stored in the Time Entry Audit Trail may be rendered without applying output encoding to certain content. Under specific conditions, this may allow stored script code to execute in the context of a user’s browser when the affected content is displayed."}],"value":"In ConnectWise PSA versions older than 2026.1, Time Entry notes stored in the Time Entry Audit Trail may be rendered without applying output encoding to certain content. Under specific conditions, this may allow stored script code to execute in the context of a user’s browser when the affected content is displayed."}],"impacts":[{"capecId":"CAPEC-63","descriptions":[{"lang":"en","value":"CAPEC-63 Cross-Site Scripting (XSS)"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d616e1a-3288-43b1-a0dd-0a65d3e70a49","shortName":"ConnectWise","dateUpdated":"2026-01-27T12:14:38.371Z"},"references":[{"url":"https://www.connectwise.com/company/trust/security-bulletins/2026-01-15-psa-security-fix"},{"url":"https://www.themissinglink.com.au/security-advisories/cve-2026-0695"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b>Cloud</b><br>Cloud instances are automatically being updated to the latest ConnectWise PSA release.<br><br><b>On-premise</b><br>Apply the 2026.1 release patches and ensure all desktop clients are up to date.<br>\n\n<br>"}],"value":"Cloud\nCloud instances are automatically being updated to the latest ConnectWise PSA release.\n\nOn-premise\nApply the 2026.1 release patches and ensure all desktop clients are up to date."}],"source":{"discovery":"UNKNOWN"},"title":"Stored XSS in Time Entry Audit Trail","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-16T14:07:34.050146Z","id":"CVE-2026-0695","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-16T14:07:48.888Z"}}]}}