Home

Description

WordPress GetPaid Plugin 2.4.6 contains an HTML injection vulnerability that allows authenticated attackers to inject arbitrary HTML code by exploiting the Help Text field in payment forms. Attackers can inject malicious HTML including image tags and scripts into the Help Text field during payment form creation, which gets stored in the database and executed in the browser when the form is viewed.

PUBLISHED Reserved 2026-02-01 | Published 2026-05-10 | Updated 2026-05-10 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Product status

2.4.6
affected

Credits

Niraj Mahajan finder

References

www.exploit-db.com/exploits/50246 (ExploitDB-50246) exploit

wordpress.org/plugins/invoicing/ (Product Reference) product

www.vulncheck.com/...aid-plugin-html-injection-via-help-text (VulnCheck Advisory: WordPress GetPaid Plugin 2.4.6 HTML Injection via Help Text) third-party-advisory

cve.org (CVE-2021-47948)

nvd.nist.gov (CVE-2021-47948)

Download JSON