<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Easy PayPal Events &amp; Tickets Plugin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/easy-paypal-events--tickets-plugin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/easy-paypal-events--tickets-plugin/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Information Disclosure Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</link><pubDate>Mon, 04 May 2026 18:16:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-easy-paypal-info-disclosure/</guid><description>An information disclosure vulnerability in the Easy PayPal Events &amp; Tickets WordPress plugin (versions 1.3 and earlier) allows unauthenticated attackers to enumerate and retrieve all customer order records via the scan_qr.php endpoint.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, versions 1.3 and earlier, contains an information disclosure vulnerability (CVE-2026-41471). This vulnerability allows unauthenticated attackers to iterate through WordPress post IDs via the <code>scan_qr.php</code> endpoint. By sequentially accessing these IDs, attackers can retrieve customer order records stored within the WordPress database. The plugin was officially closed as of March 18, 2026, meaning websites using the plugin prior to this date are vulnerable. This allows for the potential harvesting of sensitive customer data including names, addresses, and purchase histories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>scan_qr.php</code> endpoint.</li>
<li>The attacker modifies the request to iterate through sequential WordPress post IDs.</li>
<li>The server processes the request without proper authentication or authorization checks.</li>
<li>The <code>scan_qr.php</code> endpoint queries the WordPress database for order records associated with the provided post ID.</li>
<li>If a valid order record is found, the server returns the information in the HTTP response.</li>
<li>The attacker parses the HTTP response to extract customer order information.</li>
<li>The attacker repeats steps 2-7, incrementing the post ID to enumerate all order records.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to retrieve all customer order records stored in the WordPress database. This can lead to the disclosure of sensitive customer information, including names, email addresses, purchase history, and potentially other personal details. The number of affected victims depends on the popularity and usage of the vulnerable plugin. If the database contains financial information the impact could be severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule detecting requests to the scan_qr.php endpoint with iterative post IDs to identify potential exploitation attempts.</li>
<li>If still using the Easy PayPal Events &amp; Tickets plugin, remove the plugin, as it was closed as of 2026-03-18.</li>
<li>Monitor web server logs for suspicious activity targeting the <code>scan_qr.php</code> endpoint.</li>
<li>Review the WordPress access logs for requests originating from unusual IP addresses accessing the <code>scan_qr.php</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>info-disclosure</category><category>cve-2026-41471</category><category>unauthenticated</category><category>enumeration</category></item><item><title>WordPress Easy PayPal Events &amp; Tickets Plugin Authentication Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</link><pubDate>Mon, 04 May 2026 18:16:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-paypal-auth-bypass/</guid><description>An unauthenticated remote attacker can exploit a hardcoded authentication bypass vulnerability in the Easy PayPal Events &amp; Tickets plugin for WordPress (versions 1.3 and earlier) by providing 'test' as the hash parameter, allowing retrieval of sensitive order details.</description><content:encoded><![CDATA[<p>The Easy PayPal Events &amp; Tickets plugin for WordPress, version 1.3 and earlier, contains a critical hardcoded authentication bypass vulnerability (CVE-2026-32834) within its QR code scanning functionality. This flaw allows unauthenticated remote attackers to bypass hash verification by supplying the string &rsquo;test&rsquo; as the hash parameter when accessing the <code>add_wpeevent_button_qr</code> action. This bypass enables attackers to retrieve sensitive order details associated with any post ID, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information. The vulnerable plugin was officially closed on March 18, 2026, making it imperative to identify and mitigate any remaining installations to prevent potential data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a WordPress site using the Easy PayPal Events &amp; Tickets plugin (version 1.3 or earlier).</li>
<li>Attacker crafts a malicious HTTP GET request targeting the <code>/wp-admin/admin-ajax.php</code> endpoint.</li>
<li>The request includes the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code>.</li>
<li>The request includes a <code>hash</code> parameter set to the hardcoded value <code>test</code>.</li>
<li>The request includes a <code>post_id</code> parameter, either guessed or obtained through other means.</li>
<li>The vulnerable plugin bypasses authentication due to the hardcoded hash.</li>
<li>The plugin processes the request and retrieves sensitive order details associated with the provided <code>post_id</code>.</li>
<li>The attacker receives the sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants unauthenticated attackers access to sensitive customer and transaction data associated with events and tickets managed through the Easy PayPal Events &amp; Tickets plugin. The leaked information, including customer email addresses and PayPal transaction IDs, can be used for further malicious activities such as phishing campaigns, identity theft, and financial fraud. The number of affected WordPress sites is unknown, but any site using a vulnerable version of the plugin is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect WordPress Easy PayPal Events &amp; Tickets Authentication Bypass Attempt</code> to your SIEM to detect exploitation attempts targeting the vulnerable endpoint.</li>
<li>Inspect web server logs for requests to <code>/wp-admin/admin-ajax.php</code> with the <code>action</code> parameter set to <code>add_wpeevent_button_qr</code> and the <code>hash</code> parameter set to <code>test</code> to identify potential exploitation attempts.</li>
<li>Monitor network traffic for suspicious data exfiltration following the identified exploitation attempts to mitigate potential damage.</li>
<li>If the plugin is still installed, remove it immediately.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>authentication bypass</category><category>vulnerability</category></item></channel></rss>