CVE-2026-32834: WordPress Easy PayPal Plugin Authentication Bypass
The National Vulnerability Database reports a critical authentication bypass (CVE-2026-32834) in the Easy PayPal Events & Tickets plugin for WordPress, affecting versions 1.3 and earlier. This vulnerability, rated with a CVSS score of 7.5 (HIGH), enables unauthenticated remote attackers to bypass hash verification in the QR code scanning functionality. Attackers can simply supply ‘test’ as the hash parameter to gain unauthorized access.
This flaw resides in the add_wpeevent_button_qr action, allowing attackers with a known or guessed post ID to retrieve sensitive order details. This includes PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The plugin was officially closed as of March 18, 2026, indicating its end-of-life and lack of further support, exacerbating the risk for any site still running it.
This is a classic example of a hardcoded bypass (CWE-798) — a fundamental security failure. For defenders, the implications are severe: direct exposure of sensitive customer data without any authentication. This isn’t theoretical; it’s a direct path to data exfiltration and potential fraud. The attacker’s calculus is simple: enumerate post IDs, inject ‘test’, and siphon data. It’s low effort, high reward.
What This Means For You
- If your organization uses the Easy PayPal Events & Tickets plugin for WordPress, immediately check your version. If it's 1.3 or earlier, you are vulnerable. Remove this plugin NOW; it is no longer supported and poses an unacceptable risk to customer data. Audit your logs for any unauthorized access attempts to the `add_wpeevent_button_qr` endpoint.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-32834: WordPress Easy PayPal Plugin Authentication Bypass via QR Code Scan
title: CVE-2026-32834: WordPress Easy PayPal Plugin Authentication Bypass via QR Code Scan
id: scw-2026-05-04-ai-1
status: experimental
level: critical
description: |
Detects the specific authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (CVE-2026-32834). Attackers exploit this by sending a request to the 'admin-ajax.php' endpoint with the 'action' parameter set to 'add_wpeevent_button_qr' and the 'hash' parameter set to 'test', bypassing hash verification to access sensitive order details.
author: SCW Feed Engine (AI-generated)
date: 2026-05-04
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-32834/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri:
- '/wp-admin/admin-ajax.php'
cs-uri-query|contains:
- 'action=add_wpeevent_button_qr'
cs-uri-query|contains:
- 'hash=test'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-32834 | Auth Bypass | Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier |
| CVE-2026-32834 | Auth Bypass | Hardcoded authentication bypass in QR code scanning functionality |
| CVE-2026-32834 | Auth Bypass | Bypass hash verification by supplying 'test' as the hash parameter |
| CVE-2026-32834 | Information Disclosure | Vulnerable endpoint: add_wpeevent_button_qr action |
| CVE-2026-32834 | Information Disclosure | Retrieves PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 04, 2026 at 21:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.