CVE-2025-13972
WatchTowerHQ <= 3.16.0 - Authenticated (Administrator+) Arbitrary File Read via 'wht_download_big_object_origin' Parameter
CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th
The WatchTowerHQ plugin for WordPress is vulnerable to arbitrary file read via the 'wht_download_big_object_origin' parameter in all versions up to, and including, 3.16.0. This is due to insufficient path validation in the handle_big_object_download_request function. This makes it possible for authenticated attackers, with administrator-level access and a valid access token, to read arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.
| CWE | CWE-22 |
| Vendor | watchtowerhq |
| Product | watchtowerhq |
| Published | Dec 12, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for watchtowerhq watchtowerhq
Be the first to know when new medium vulnerabilities affecting watchtowerhq watchtowerhq are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
watchtowerhq / WatchTowerHQ
0 โค 3.16.0
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/13fcbff8-8560-48ca-82df-8b620961d9c6?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/watchtowerhq/tags/3.15.0/src/Download.php#L104 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/watchtowerhq/trunk/src/Download.php#L104
Credits
Camilla Flocco