CVE-2025-3604

📊 9.8 CRITICAL0.2%🎯 1 exploits
📅 Published Apr 24, 2025
📋 Status: Analyzed

The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

🎯 Affected Products & Systems

1 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: ≤ 2.2.0
Target SW: wordpress
CPE:
cpe:2.3:a:flynax:flynax_bridge:*:*:*:*:*:wordpress:*:*
Metrics
9.8 CRITICALCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
9.8 (CRITICAL)v3.1
EPSS Details
0.2% (Minimal)40.5th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
Apr 24, 2025 (6 months ago)
Last Modified
Aug 12, 2025 (2 months ago)
Security Weaknesses1

Available exploits (1)

🔐 Sign-in Required

Sign in to view exploits and proof-of-concept code.

References3