CVE-2021-47948

medium

Description

WordPress GetPaid Plugin 2.4.6 contains an HTML injection vulnerability that allows authenticated attackers to inject arbitrary HTML code by exploiting the Help Text field in payment forms. Attackers can inject malicious HTML including image tags and scripts into the Help Text field during payment form creation, which gets stored in the database and executed in the browser when the form is viewed.

References

https://www.vulncheck.com/advisories/wordpress-getpaid-plugin-html-injection-via-help-text

https://www.exploit-db.com/exploits/50246

https://wordpress.org/plugins/invoicing/

Details

Source: Mitre, NVD

Published: 2026-05-10

Updated: 2026-05-10

Risk Information

CVSS v2

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Severity: Medium