CVE-2026-32834
HIGHEasy PayPal Events & Tickets 1.3 Authentication Bypass via QR Code Scanning
Title source: cnaDescription
Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.
References (3)
Core 3
Core References
Exploit technical-description
exploit
https://gist.github.com/4lec4st/eb20f9934f8c23b4b241f74a8d884ce9
Product product
https://wordpress.org/plugins/easy-paypal-events-tickets
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/easy-paypal-events-tickets-authentication-bypass-via-qr-code-scanning
Scores
CVSS v3
7.5
EPSS
0.0010
EPSS Percentile
26.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-798
Status
published
Products (1)
Scott Paterson/easy-paypal-events-tickets
< 1.3
Published
May 04, 2026
Tracked Since
May 04, 2026