CVE-2021-47948
WordPress GetPaid Plugin 2.4.6 HTML Injection via Help Text
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
8th
WordPress GetPaid Plugin 2.4.6 contains an HTML injection vulnerability that allows authenticated attackers to inject arbitrary HTML code by exploiting the Help Text field in payment forms. Attackers can inject malicious HTML including image tags and scripts into the Help Text field during payment form creation, which gets stored in the database and executed in the browser when the form is viewed.
| CWE | CWE-80 |
| Vendor | invoicing |
| Product | payments plugin getpaid |
| Published | May 10, 2026 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for invoicing payments plugin getpaid
Be the first to know when new medium vulnerabilities affecting invoicing payments plugin getpaid are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
None
Integrity
None
Availability
None
Affected Versions
invoicing / Payments Plugin GetPaid
2.4.6
References
Credits
Niraj Mahajan