First published: Fri May 02 2025(Updated: )
The Flynax Bridge plugin for WordPress is vulnerable to limited Privilege Escalation due to a missing capability check on the registerUser() function in all versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to register new user accounts as authors.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Flynax Bridge | <=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4179 has a severity rating of high due to its ability to allow unauthenticated attackers to register user accounts.
To fix CVE-2025-4179, update the Flynax Bridge plugin to version 2.2.1 or later where the issue is resolved.
CVE-2025-4179 affects all versions of the Flynax Bridge plugin for WordPress up to and including version 2.2.0.
An attacker exploiting CVE-2025-4179 can register new user accounts with administrative privileges on the affected site.
There is currently no evidence to suggest that CVE-2025-4179 is being actively exploited in the wild.