Overview
- Description
- The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- security@wordfence.com
- CWE-288
Social media
- Hype score
- Not currently trending
[CVE-2024-9933: CRITICAL] WordPress plugin WatchTowerHQ up to v3.9.6 is at risk of authentication bypass. The flaw lies in 'watchtower_ota_token' default value, granting unauthorized access to the admin user.#cybersecurity,#vulnerability https://t.co/6E1P9VQ0i9 https://t.co/wLYok
@CveFindCom
26 Oct 2024
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-9933 The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default … https://t.co/Tt2nRHY4Hg
@CVEnew
26 Oct 2024
588 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes