The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
References
Configurations
No configuration.
History
28 Oct 2024, 13:58
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
26 Oct 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-26 03:15
Updated : 2024-10-28 13:58
NVD link : CVE-2024-9933
Mitre link : CVE-2024-9933
CVE.ORG link : CVE-2024-9933
JSON object : View
Products Affected
No product.
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel