Skip to content
CVSS 7.5 · HIGH

CVE-2026-32834

Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.

View on NVD

Analysis

The vulnerability involves a hardcoded authentication bypass in the Easy PayPal Events & Tickets plugin for WordPress, allowing attackers to access sensitive transaction and customer data. As this is a niche plugin that has been officially closed and retired, it does not meet the threshold for a community-wide security alert.

Severity

Score: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: NONE
A: NONE
Weakness (CWE): CWE-798

EPSS

Probability of exploitation (next 30 days): 0.0010 (0.1%)
Percentile: 26.5%
EPSS: 2026-05-06

Technical description

Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.

Published: 5/4/2026, 6:16:27 PM
Last modified: 5/5/2026, 7:47:57 PM

References

HomeEventsBlogResourcesTeam