
Cloud Vulnerability DB
A community-led vulnerabilities database
The Flynax Bridge plugin for WordPress contains a limited Privilege Escalation vulnerability (CVE-2025-4179) discovered and disclosed on May 1, 2025. The vulnerability affects all versions up to and including 2.2.0, stemming from a missing capability check in the registerUser() function, which allows unauthenticated attackers to create new user accounts with author privileges (NVD, Wiz).
The vulnerability originates from a missing authorization check in the registerUser() function within the API.php file of the Flynax Bridge plugin. The function allows the creation of new user accounts with author privileges without proper authentication verification. The vulnerability has been assigned a CVSS v3.1 base score of 7.3 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L and is classified as CWE-862: Missing Authorization (NVD, Wiz).
The vulnerability enables unauthenticated attackers to create new user accounts with author privileges on affected WordPress installations. This could lead to unauthorized content publication, modification of existing content, and potential escalation of privileges through additional attack vectors (Wiz).
Website administrators running the Flynax Bridge plugin should update to a version newer than 2.2.0 as soon as it becomes available. Until then, it is recommended to implement additional security measures such as web application firewalls or to consider temporarily disabling the plugin if it's not critical to website operations (Wiz).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."