CVE-2025-3603

9.8 CRITICAL

📋 TL;DR

The Flynax Bridge WordPress plugin has a critical authentication bypass vulnerability that allows unauthenticated attackers to reset any user's password, including administrators. This enables complete account takeover and privilege escalation. All WordPress sites using this plugin up to version 2.2.0 are affected.

💻 Affected Systems

Products:
  • Flynax Bridge WordPress Plugin
Versions: All versions up to and including 2.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any WordPress installation with the Flynax Bridge plugin enabled is vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise where attackers take over administrator accounts, install backdoors, steal sensitive data, and deface or destroy the website.

🟠

Likely Case

Attackers gain administrative access to WordPress sites, potentially leading to data theft, malware injection, or ransomware deployment.

🟢

If Mitigated

With proper monitoring and detection, unauthorized password resets can be detected and blocked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with publicly available technical details. Attackers can use automated tools to mass-exploit vulnerable sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.1 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/flynax-bridge/trunk/request.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Flynax Bridge and update to version 2.2.1 or later. 4. If update not available, disable and remove the plugin immediately.

🔧 Temporary Workarounds

Disable Flynax Bridge Plugin

linux

Immediately disable the vulnerable plugin to prevent exploitation

wp plugin deactivate flynax-bridge

🧯 If You Can't Patch

  • Disable the Flynax Bridge plugin immediately
  • Implement web application firewall rules to block requests to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Flynax Bridge version 2.2.0 or earlier

Check Version:

wp plugin list --name=flynax-bridge --field=version

Verify Fix Applied:

Verify Flynax Bridge plugin is updated to version 2.2.1 or later, or confirm plugin is disabled/removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests, especially for admin accounts from unfamiliar IPs
  • Multiple failed login attempts followed by successful login from new IP

Network Indicators:

  • HTTP POST requests to /wp-content/plugins/flynax-bridge/request.php with password reset parameters

SIEM Query:

source="wordpress.log" AND ("password reset" OR "flynax-bridge") AND status=200

🔗 References

📤 Share & Export