Vulnerability Description
Easy PayPal Events & Tickets plugin for WordPress before version 1.4 contains a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter. Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://gist.github.com/4lec4st/eb20f9934f8c23b4b241f74a8d884ce9
- https://wordpress.org/plugins/easy-paypal-events-tickets
- https://www.vulncheck.com/advisories/easy-paypal-events-tickets-authentication-b
FAQ
What is CVE-2026-32834?
CVE-2026-32834 is a vulnerability with a CVSS score of 7.5 (HIGH). Easy PayPal Events & Tickets plugin for WordPress before version 1.4 contains a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote a...
How severe is CVE-2026-32834?
CVE-2026-32834 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-32834?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.