Cyber Posture

CVE-2026-32834

HighPublic PoC

Published: 04 May 2026

Published
04 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0012 29.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32834 is a high-severity Use of Hard-coded Credentials (CWE-798) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-798

Enables users to notice when hard-coded credentials have been exploited for unauthorized access.

addresses: CWE-798

Security training explicitly warns against hard-coded credentials, lowering their use in systems.

addresses: CWE-798

Policy and procedures prohibit hard-coded credentials in favor of managed authentication.

addresses: CWE-798

External identity providers eliminate the need for hard-coded credentials in applications.

addresses: CWE-798

Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.

addresses: CWE-798

Central credential stores and rotation policies remove the need for hard-coded credentials in configuration files or code.

addresses: CWE-798

Intelligence programs surface reports of campaigns that abuse hard-coded credentials in products, prompting removal or replacement and thereby reducing successful exploitation.

addresses: CWE-798

Planned investment enables secure credential storage and management systems instead of hard-coded credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Hardcoded credential bypass (CWE-798) in public-facing WordPress plugin directly enables unauthenticated remote exploitation of the web application to retrieve sensitive order/ticket data via the exposed QR endpoint.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Easy PayPal Events & Tickets plugin for WordPress version 1.3 and earlier contain a hardcoded authentication bypass vulnerability in the QR code scanning functionality that allows unauthenticated remote attackers to bypass hash verification by supplying 'test' as the hash parameter.…

more

Attackers can access the vulnerable endpoint via the add_wpeevent_button_qr action to retrieve sensitive order details including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information for any order with a known or guessed post ID. This plugin was officially closed as of 2026-03-18.

Deeper analysisAI

CVE-2026-32834 is a hardcoded authentication bypass vulnerability (CWE-798) in the Easy PayPal Events & Tickets plugin for WordPress, affecting versions 1.3 and earlier. The issue exists in the QR code scanning functionality, where attackers can bypass hash verification by supplying the hardcoded value 'test' as the hash parameter. Published on 2026-05-04 with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), it enables high confidentiality impact without requiring privileges or user interaction.

Unauthenticated remote attackers can exploit the vulnerability by accessing the add_wpeevent_button_qr action endpoint. With a known or guessed post ID for any order, they can retrieve sensitive data, including PayPal transaction IDs, customer email addresses, purchase amounts, and ticket information.

No patches are available, as the plugin was officially closed on 2026-03-18. Advisories, including those from VulnCheck, recommend removing or disabling the plugin on affected WordPress installations to mitigate exposure. Additional details are available at the referenced sources: https://gist.github.com/4lec4st/eb20f9934f8c23b4b241f74a8d884ce9, https://wordpress.org/plugins/easy-paypal-events-tickets, and https://www.vulncheck.com/advisories/easy-paypal-events-tickets-authentication-bypass-via-qr-code-scanning.

Details

CWE(s)

Affected Products

WordPress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2020-36911Shared CWE-798
CVE-2026-27073Shared CWE-798
CVE-2026-30701Shared CWE-798
CVE-2025-42890Shared CWE-798
CVE-2026-35503Shared CWE-798
CVE-2025-7401Shared CWE-798
CVE-2025-1393Shared CWE-798
CVE-2026-25202Shared CWE-798
CVE-2025-55262Shared CWE-798
CVE-2024-8893Shared CWE-798

References