Home

Description

Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.

PUBLISHED Reserved 2026-03-16 | Published 2026-05-04 | Updated 2026-05-04 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-798 Use of Hard-coded Credentials

Product status

Default status
affected

Any version
affected

Credits

4lec4st finder

References

gist.github.com/4lec4st/eb20f9934f8c23b4b241f74a8d884ce9 technical-description exploit

wordpress.org/plugins/easy-paypal-events-tickets product

www.vulncheck.com/...hentication-bypass-via-qr-code-scanning third-party-advisory

cve.org (CVE-2026-32834)

nvd.nist.gov (CVE-2026-32834)

Download JSON