๐Ÿ” CVE Alert

CVE-2025-13972

MEDIUM 4.9

WatchTowerHQ <= 3.16.0 - Authenticated (Administrator+) Arbitrary File Read via 'wht_download_big_object_origin' Parameter

CVSS Score
4.9
EPSS Score
0.0%
EPSS Percentile
0th

The WatchTowerHQ plugin for WordPress is vulnerable to arbitrary file read via the 'wht_download_big_object_origin' parameter in all versions up to, and including, 3.16.0. This is due to insufficient path validation in the handle_big_object_download_request function. This makes it possible for authenticated attackers, with administrator-level access and a valid access token, to read arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.

CWE CWE-22
Vendor watchtowerhq
Product watchtowerhq
Published Dec 12, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for watchtowerhq watchtowerhq

Be the first to know when new medium vulnerabilities affecting watchtowerhq watchtowerhq are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

watchtowerhq / WatchTowerHQ
0 โ‰ค 3.16.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/13fcbff8-8560-48ca-82df-8b620961d9c6?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/watchtowerhq/tags/3.15.0/src/Download.php#L104 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/watchtowerhq/trunk/src/Download.php#L104

Credits

Camilla Flocco