CVE-2025-15561

An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.
References
Link Resource
https://r.sec-consult.com/worktime Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nestersoft:worktime:*:*:*:*:cloud:*:*:*
cpe:2.3:a:nestersoft:worktime:*:*:*:*:on-premise:*:*:*

History

No history.

Information

Published : 2026-02-19 11:15

Updated : 2026-02-26 02:58


NVD link : CVE-2025-15561

Mitre link : CVE-2025-15561

CVE.ORG link : CVE-2025-15561


JSON object : View

Products Affected

nestersoft

  • worktime
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo