vulnerability
WordPress Plugin: watchtowerhq: CVE-2022-44583: Files or Directories Accessible to External Parties
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Nov 1, 2022 | May 15, 2025 | Jun 24, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Nov 1, 2022
Added
May 15, 2025
Modified
Jun 24, 2025
Description
The WatchTowerHQ plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 3.6.15 due to missing capability checks on several REST API endpoints. This makes it possible for unauthenticated attackers to download arbitrary files on the affected site's server leading to Information Exposure.
Solution
watchtowerhq-plugin-cve-2022-44583
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.