Unrated severityNVD Advisory· Published Feb 19, 2026· Updated Feb 23, 2026
Local Privilege Escalation in NesterSoft WorkTime
CVE-2025-15561
Description
An attacker can exploit the update behavior of the WorkTime monitoring daemon to elevate privileges on the local system to NT Authority\SYSTEM. A malicious executable must be named WTWatch.exe and dropped in the C:\ProgramData\wta\ClientExe directory, which is writable by "Everyone". The executable will then be run by the WorkTime monitoring daemon.
Affected products
2- Range: <= 11.8.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- r.sec-consult.com/worktimemitrethird-party-advisory
News mentions
0No linked articles in our index yet.