WordPress GetPaid Plugin 2.4.6 contains an HTML injection vulnerability that allows authenticated attackers to inject arbitrary HTML code by exploiting the Help Text field in payment forms. Attackers can inject malicious HTML including image tags and scripts into the Help Text field during payment form creation, which gets stored in the database and executed in the browser when the form is viewed.
Metrics
Affected Vendors & Products
References
History
Mon, 11 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Invoicing
Invoicing payments Plugin Getpaid Wordpress Wordpress wordpress |
|
| Vendors & Products |
Invoicing
Invoicing payments Plugin Getpaid Wordpress Wordpress wordpress |
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WordPress GetPaid Plugin 2.4.6 contains an HTML injection vulnerability that allows authenticated attackers to inject arbitrary HTML code by exploiting the Help Text field in payment forms. Attackers can inject malicious HTML including image tags and scripts into the Help Text field during payment form creation, which gets stored in the database and executed in the browser when the form is viewed. | |
| Title | WordPress GetPaid Plugin 2.4.6 HTML Injection via Help Text | |
| Weaknesses | CWE-80 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-05-10T12:44:05.133Z
Updated: 2026-05-11T14:43:19.540Z
Reserved: 2026-02-01T11:24:18.719Z
Link: CVE-2021-47948
Updated: 2026-05-11T14:43:15.285Z
Status : Deferred
Published: 2026-05-10T13:16:31.323
Modified: 2026-05-12T14:24:15.210
Link: CVE-2021-47948
No data.
ReportizFlow