CVE-2024-9933
WatchTowerHQ <= 3.9.6 - Authentication Bypass to Administrator due to Missing Empty Value Check
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2024-10-14 CVE Reserved
- 2024-10-25 CVE Published
- 2024-10-26 EPSS Updated
- 2024-10-28 CVE Updated
- 2024-11-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
CAPEC
References (4)
URL | Date | SRC |
---|---|---|
https://github.com/RandomRobbieBF/CVE-2024-9933 | 2024-11-05 | |
https://github.com/Nxploited/CVE-2024-9933 | 2024-12-27 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Watchtowerhq Search vendor "Watchtowerhq" | WatchTowerHQ Search vendor "Watchtowerhq" for product "WatchTowerHQ" | <= 3.9.6 Search vendor "Watchtowerhq" for product "WatchTowerHQ" and version " <= 3.9.6" | en |
Affected
|