The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.6. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it possible for unauthenticated attackers to log in to the WatchTowerHQ client administrator user.
                
            References
                    Configurations
                    No configuration.
History
                    28 Oct 2024, 13:58
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
26 Oct 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-10-26 03:15
Updated : 2024-10-28 13:58
NVD link : CVE-2024-9933
Mitre link : CVE-2024-9933
CVE.ORG link : CVE-2024-9933
JSON object : View
Products Affected
                No product.
CWE
                
                    
                        
                        CWE-288
                        
            Authentication Bypass Using an Alternate Path or Channel
