CVE-2025-14265

Source
https://cve.org/CVERecord?id=CVE-2025-14265
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14265.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-14265
Published
2025-12-11T15:15:46.863Z
Modified
2026-03-12T17:37:51.124754Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In versions of ScreenConnectâ„¢ prior to 25.8, server-side validation and integrity checks within the extension subsystem could allow the installation and execution of untrusted or arbitrary extensions by authorized or administrative users. Abuse of this behavior could result in the execution of custom code on the server or unauthorized access to application configuration data. This issue affects only the ScreenConnect server component; host and guest clients are not impacted. ScreenConnect 25.8 introduces enhanced server-side configuration handling and integrity checks to ensure only trusted extensions can be installed.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14265.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "25.8.0.9438"
            }
        ]
    }
]