CVE-2025-4177
📊 5.3 MEDIUM⚡ 0.1%🎯 0 exploits
📅 Published May 2, 2025
📋 Status: Analyzed
The Flynax Bridge plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the deleteUser() function in all versions up to, and including, 2.2.0. This makes it possible for unauthenticated attackers to delete arbitrary users.
CVSS v3.1 • [email protected]
🎯 Affected Products & Systems
1 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String | 
|---|---|---|---|---|---|
| 📱App | flynax | flynax bridge | ≤ 2.2.0 Target SW: wordpress | Vulnerable | cpe:2.3:a:flynax:flynax_bridge:*:*:*:*:*:wordpress:*:* | 
📱
VulnerableApplication
Version: ≤ 2.2.0
Target SW: wordpress
CPE:
cpe:2.3:a:flynax:flynax_bridge:*:*:*:*:*:wordpress:*:*
Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
NONE
User Interaction:
NONE
Confidentiality:
NONE
Integrity:
LOW
Availability:
NONE
Scope:
UNCHANGED
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
5.3 (MEDIUM)v3.1
Source: [email protected]
EPSS Details
0.1% (Minimal)31.6th percentile
Last updated: Oct 30, 2025
Exploitation probability within 30 days
Published Date
May 2, 2025 (6 months ago)
Last Modified
May 6, 2025 (5 months ago)
Security Weaknesses2
CWE-862
References3
NVDadvisorygeneral