WordPress Easy PayPal Events & Tickets Plugin Authentication Bypass Vulnerability
An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events & Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.
The Easy PayPal Events & Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string ’test’ as the hash parameter when accessing the add_wpeevent_button_qr action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.
Attack Chain
- Attacker identifies a WordPress site using the Easy PayPal Events & Tickets plugin (version 1.3 or earlier).
- Attacker crafts a malicious HTTP GET request targeting the
/wp-admin/admin-ajax.phpendpoint. - The request includes the
actionparameter set toadd_wpeevent_button_qr. - The request includes a
hashparameter set to the hardcoded valuetest. - The request includes a
post_idparameter, either guessed or obtained through other means. - The vulnerable plugin bypasses authentication due to the hardcoded hash.
- The plugin processes the request and retrieves sensitive order details associated with the provided
post_id. - The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.
Impact
Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events & Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.
Recommendation
- Deploy the Sigma rule
Detect WordPress Easy PayPal Events & Tickets Authentication Bypass Attemptto your SIEM to detect exploitation attempts targeting the vulnerable endpoint. - Inspect web server logs for requests to
/wp-admin/admin-ajax.phpwith theactionparameter set toadd_wpeevent_button_qrand thehashparameter set totestto identify potential exploitation attempts. - Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.
- If the plugin is still installed, remove it immediately.
Detection coverage 2
Detect WordPress Easy PayPal Events & Tickets Authentication Bypass Attempt
criticalDetects attempts to exploit the hardcoded authentication bypass vulnerability (CVE-2026-32834) in the Easy PayPal Events & Tickets plugin for WordPress by monitoring requests with the 'test' hash.
Detect WordPress AJAX endpoint abuse
mediumDetects requests to the WordPress AJAX endpoint with unusual parameters that could indicate exploit attempts
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| customer email addresses |