Skip to content
CVSS 7.5 · HIGH

CVE-2026-32834

Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.

Ver en NVD

Análisis

The vulnerability involves a hardcoded authentication bypass in the Easy PayPal Events & Tickets plugin for WordPress, allowing attackers to access sensitive transaction and customer data. As this is a niche plugin that has been officially closed and retired, it does not meet the threshold for a community-wide security alert.

Severidad

Puntaje: 7.5(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: NONE
A: NONE
Tipo de falla (CWE): CWE-798

EPSS

Probabilidad de explotación (próx. 30 días): 0.0010 (0.1%)
Percentil: 26.5%
EPSS: 2026-05-06

Descripción técnica

Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.

Publicada: 4/5/2026, 18:16:27
Última modificación: 5/5/2026, 19:47:57

Referencias

InicioEventosBlogRecursosEquipo