CVE-2026-0696

6.5 MEDIUM

📋 TL;DR

ConnectWise PSA versions before 2026.1 fail to set HttpOnly attribute on certain session cookies, potentially allowing client-side scripts to access session data. This affects organizations using vulnerable ConnectWise PSA installations. Attackers could steal session cookies to impersonate legitimate users.

💻 Affected Systems

Products:
  • ConnectWise PSA
Versions: All versions older than 2026.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects web interface components that handle session cookies.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Session hijacking leading to full account compromise, unauthorized access to sensitive business data, and potential privilege escalation within the PSA system.

🟠

Likely Case

Attackers stealing session cookies via XSS or other client-side attacks to gain unauthorized access to user accounts with limited privileges.

🟢

If Mitigated

Minimal impact if proper web application firewalls, content security policies, and input validation are implemented to prevent script injection.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to execute client-side scripts (typically via XSS) to access cookie values.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2026.1 or later

Vendor Advisory: https://www.connectwise.com/company/trust/security-bulletins/2026-01-15-psa-security-fix

Restart Required: Yes

Instructions:

1. Backup your ConnectWise PSA installation and database. 2. Apply the ConnectWise PSA 2026.1 update through the administrative interface. 3. Restart the ConnectWise PSA services. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Deploy a strict Content Security Policy to prevent script injection attacks that could exploit this vulnerability.

Web Application Firewall Rules

all

Configure WAF rules to detect and block session cookie access attempts from client-side scripts.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding to prevent XSS attacks
  • Deploy network segmentation to limit access to ConnectWise PSA interfaces

🔍 How to Verify

Check if Vulnerable:

Check ConnectWise PSA version in administrative interface. If version is older than 2026.1, system is vulnerable.

Check Version:

Check version in ConnectWise PSA administrative dashboard under System Information

Verify Fix Applied:

After updating to 2026.1 or later, verify session cookies now include HttpOnly attribute in browser developer tools.

📡 Detection & Monitoring

Log Indicators:

  • Unusual session creation patterns
  • Multiple failed login attempts followed by successful login from different IP

Network Indicators:

  • Unexpected JavaScript requests attempting to access document.cookie
  • Suspicious client-side script injections

SIEM Query:

source="connectwise_psa" AND (event_type="session_hijack" OR cookie_access="unauthorized")

🔗 References

📤 Share & Export