🔐 CVE Alert

CVE-2024-9933

CRITICAL 9.8

WatchTowerHQ <= 3.10.1 - Authentication Bypass to Administrator due to Missing Empty Value Check

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.

CWE CWE-288
Vendor watchtowerhq
Product watchtowerhq
Published Oct 26, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for watchtowerhq watchtowerhq

Be the first to know when new critical vulnerabilities affecting watchtowerhq watchtowerhq are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

watchtowerhq / WatchTowerHQ
0 ≤ 3.10.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/50349086-e7b0-4f73-8722-1367cc05180e?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/watchtowerhq/tags/3.9.6/src/Password_Less_Access.php#L56 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3177064/watchtowerhq#file2

Credits

István Márton