Vulnerabilities and security researches forflynax-bridge flynax-bridge
Direction: ascendingApr 25, 2025
Flynax Bridge # CVE-2025-3604
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 24, 2025
- Research Description
- The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
- Affected versions
-
max 2.2.0.
- Status
-
vulnerable
Apr 29, 2025
Flynax Bridge # CVE-2025-3603
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 24, 2025
- Research Description
- The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
- Affected versions
-
max 2.2.0.
- Status
-
vulnerable
May 04, 2025
Flynax Bridge # CVE-2025-4177
- CVE, Research URL
- Home page URL
- Application
- Date
- May 02, 2025
- Research Description
- The Flynax Bridge plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the deleteUser() function in all versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to delete arbitrary users.
- Affected versions
-
max 2.2.0.
- Status
-
vulnerable
Flynax Bridge # CVE-2025-4179
- CVE, Research URL
- Home page URL
- Application
- Date
- May 02, 2025
- Research Description
- The Flynax Bridge plugin for WordPress is vulnerable to limited Privilege Escalation due to a missing capability check on the registerUser() function in all versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to register new user accounts as authors.
- Affected versions
-
max 2.2.0.
- Status
-
vulnerable