The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
References
Configurations
No configuration.
History
08 Apr 2026, 18:23
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary | (en) The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user. |
28 Oct 2024, 13:58
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Oct 2024, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-26 03:15
Updated : 2026-04-15 00:35
NVD link : CVE-2024-9933
Mitre link : CVE-2024-9933
CVE.ORG link : CVE-2024-9933
JSON object : View
Products Affected
No product.
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
