CVE-2025-15561

Severity CVSS v4.0:
Pending analysis
Type:
CWE-269 Improper Privilege Management
Publication date:
19/02/2026
Last modified:
26/02/2026

Description

An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:* 11.8.8 (including)
cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:* 11.8.8 (including)


References to Advisories, Solutions, and Tools