cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forflynax-bridge flynax-bridge

Direction: descending
May 04, 2025

Flynax Bridge # CVE-2025-4177

CVE, Research URL

CVE-2025-4177

Application

Flynax Bridge

Date
May 02, 2025
Research Description
The Flynax Bridge plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the deleteUser() function in all versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to delete arbitrary users.
Affected versions
max 2.2.0.
Status
vulnerable

Flynax Bridge # CVE-2025-4179

CVE, Research URL

CVE-2025-4179

Application

Flynax Bridge

Date
May 02, 2025
Research Description
The Flynax Bridge plugin for WordPress is vulnerable to limited Privilege Escalation due to a missing capability check on the registerUser() function in all versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to register new user accounts as authors.
Affected versions
max 2.2.0.
Status
vulnerable
Apr 29, 2025

Flynax Bridge # CVE-2025-3603

CVE, Research URL

CVE-2025-3603

Application

Flynax Bridge

Date
Apr 24, 2025
Research Description
The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.
Affected versions
max 2.2.0.
Status
vulnerable
Apr 25, 2025

Flynax Bridge # CVE-2025-3604

CVE, Research URL

CVE-2025-3604

Application

Flynax Bridge

Date
Apr 24, 2025
Research Description
The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
Affected versions
max 2.2.0.
Status
vulnerable