Authentication Bypass in Easy PayPal Events & Tickets Plugin for WordPress
CVE-2026-32834

8.7HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
4 May 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-32834?

The Easy PayPal Events & Tickets plugin for WordPress is susceptible to a vulnerability that allows attackers to bypass authentication mechanisms through the QR code scanning feature. By exploiting this flaw, unauthenticated remote attackers can utilize the 'test' value as a hash parameter to gain unauthorized access to sensitive order information. This includes retrieving PayPal transaction IDs, customer email addresses, purchase amounts, and ticket details associated with known or easily guessed post IDs. Consequently, this vulnerability poses a significant risk as attackers can exploit the add_wpeevent_button_qr action to access data intended for legitimate users. The plugin has been officially closed as of March 18, 2026.

Affected Version(s)

easy-paypal-events-tickets 0 <= 1.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

4lec4st
.