Impact
The Flynax Bridge plugin for WordPress contains a flaw that allows an unauthenticated attacker to reset any user's password, including administrators. The plugin fails to verify that the requestor is the legitimate account owner before applying the password change, enabling an attacker to assume control of any account. This results in full account takeover and can lead to further compromise of the site.
Affected Systems
All users of the Flynax Bridge WordPress plugin with versions 2.2.0 or earlier are affected. The vulnerability is present in the B2B marketplace bridge component distributed under the Flynax brand. No specific host or OS constraints are listed, indicating the issue is confined to the plugin within any WordPress installation that enables it.
Risk and Exploitability
The flaw carries a CVSS score of 9.8, denoting critical severity, but its EPSS score of less than 1% indicates a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers need no credentials or special conditions; an unauthenticated user can trigger the password reset by crafting a request to the vulnerable endpoint, making the attack vector straightforward and the potential damage severe due to full credential compromise.
OpenCVE Enrichment
EUVD