vendor:
WordPress Payments Plugin | GetPaid
by:
Niraj Mahajan
8,8
CVSS
HIGH
HTML Injection
79
CWE
Product Name: WordPress Payments Plugin | GetPaid
Affected Version From: 2.4.6
Affected Version To: 2.4.6
Patch Exists: Yes
Related CWE: N/A
CPE: a:invoicing:wordpress_payments_plugin:2.4.6
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2021
WordPress Plugin Payments Plugin | GetPaid 2.4.6 – HTML Injection
The vulnerability exists in the WordPress Payments Plugin | GetPaid version 2.4.6, which allows an attacker to inject malicious HTML code into the 'Help Text' field of the Payment Form page. By exploiting this vulnerability, an attacker can inject malicious HTML code into the database and execute it successfully, resulting in the display of an image on the right hand side.
Mitigation:
The user should update the WordPress Payments Plugin | GetPaid to the latest version to mitigate this vulnerability.