CVE Vulnerabilities

CVE-2025-15561

Improper Privilege Management

Published: Feb 19, 2026 | Modified: Feb 26, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT AuthoritySYSTEM. A malicious executable must be named  WTWatch.exe and dropped in the C:ProgramDatawtaClientExe directory, which is writable by Everyone. The executable will then be run by the WorkTime monitoring daemon.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
WorktimeNestersoft*11.8.8 (including)

Potential Mitigations

References