Plugin Vulnerability Hub
Plugin 5 known issues Latest disclosed Dec 11, 2025

WatchTowerHQ Vulnerabilities

Review known vulnerability records for the WordPress plugin WatchTowerHQ (`watchtowerhq`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2025-13972, CVE-2024-9933 and CVE-2023-25701, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
5
High or Critical
4
Patch Coverage
100%
Last Updated
Jan 13, 2026
Priority CVE Quick Links

Fast paths into WatchTowerHQ CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
5
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for WatchTowerHQ so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
5 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
3 critical and 1 high severity finding.
Recent CVEs
CVE-2025-13972, CVE-2024-9933 and CVE-2023-25701
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for WatchTowerHQ

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2025-13972
CVE-2025-13972: WatchTowerHQ <= 3.16.0 - Authenticated (Administrator+) Arbitrary File Read via 'wht_download_big_object_origin' Parameter

The WatchTowerHQ plugin for WordPress is vulnerable to arbitrary file read via the 'wht_download_big_object_origin' parameter in all versions up to, and including, 3.16.0. This is due to insufficient path validation in the handle_big_object_download_request function. This makes i...

Published
Dec 11, 2025
Patched Release
3.16.1
Affected Versions
Versions up to 3.16.0
Next Step
Update to 3.16.1 or newer if supported.
Plugin Critical Patched: Yes CVE-2024-9933
CVE-2024-9933: WatchTowerHQ <= 3.10.1 - Authentication Bypass to Administrator due to Missing Empty Value Check

The WatchTowerHQ plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.10.1. This is due to the 'watchtower_ota_token' default value is empty, and the not empty check is missing in the 'Password_Less_Access::login' function. This makes it...

Published
Oct 25, 2024
Patched Release
3.10.4
Affected Versions
Versions up to 3.10.1
Next Step
Update to 3.10.4 or newer if supported.
Plugin Critical Patched: Yes CVE-2023-25701
CVE-2023-25701: WatchTowerHQ <= 3.6.16 - Type Juggling to Authentication Bypass in check_ota

The WatchTowerHQ plugin for WordPress is vulnerable to a type juggling issue in versions up to, and including, 3.6.16. This is due to an incorrect comparison in the check_ota function between the user-supplied access token and the configured WatchTower access token. This makes it...

Published
Feb 14, 2023
Patched Release
3.6.17
Affected Versions
Versions up to 3.6.16
Next Step
Update to 3.6.17 or newer if supported.
Plugin Critical Patched: Yes CVE-2022-44584
CVE-2022-44584: WatchTowerHQ <= 3.6.15 - Unauthenticated Arbitrary File Deletion

The WatchTowerHQ plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including, 3.6.15 due to missing capability checks on several REST API endpoints. This makes it possible for unauthenticated attackers to delete arbitrary files on the affected s...

Published
Nov 01, 2022
Patched Release
3.6.16
Affected Versions
Versions up to 3.6.15
Next Step
Update to 3.6.16 or newer if supported.
Plugin High Patched: Yes CVE-2022-44583
CVE-2022-44583: WatchTowerHQ <= 3.6.15 - Unauthenticated Arbitrary File Download

The WatchTowerHQ plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 3.6.15 due to missing capability checks on several REST API endpoints. This makes it possible for unauthenticated attackers to download arbitrary files on the affecte...

Published
Nov 01, 2022
Patched Release
3.6.16
Affected Versions
Versions up to 3.6.15
Next Step
Update to 3.6.16 or newer if supported.