๐Ÿ” CVE Alert

CVE-2021-47948

MEDIUM 5.4

WordPress GetPaid Plugin 2.4.6 HTML Injection via Help Text

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
8th

WordPress GetPaid Plugin 2.4.6 contains an HTML injection vulnerability that allows authenticated attackers to inject arbitrary HTML code by exploiting the Help Text field in payment forms. Attackers can inject malicious HTML including image tags and scripts into the Help Text field during payment form creation, which gets stored in the database and executed in the browser when the form is viewed.

CWE CWE-80
Vendor invoicing
Product payments plugin getpaid
Published May 10, 2026
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for invoicing payments plugin getpaid

Be the first to know when new medium vulnerabilities affecting invoicing payments plugin getpaid are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
None
Availability
None

Affected Versions

invoicing / Payments Plugin GetPaid
2.4.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/50246 wordpress.org: https://wordpress.org/plugins/invoicing/ vulncheck.com: https://www.vulncheck.com/advisories/wordpress-getpaid-plugin-html-injection-via-help-text

Credits

Niraj Mahajan