By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
Tech News

Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

By Viral Trending Content 4 Min Read
Share
SHARE

Ravie LakshmananMay 16, 2026Vulnerability / Website Security

A critical security vulnerability impacting the
Funnel Builder
plugin for WordPress has come under active exploitation in the wild to
inject malicious JavaScript code
into WooCommerce checkout pages with the goal of stealing payment data.

Details of the activity were
published
by Sansec this week. The vulnerability currently does not have an official CVE identifier. It affects all versions of the plugin before 3.15.0.3. It’s used in more than 40,000 WooCommerce stores. 

The flaw lets unauthenticated attackers inject arbitrary JavaScript into every checkout page on the store, the Dutch e-commerce security company said. FunnelKit, which maintains Funnel Builder, has released a patch for the vulnerability in version 3.15.0.3.

“Attackers are planting fake Google Tag Manager scripts into the plugin’s ‘External Scripts’ setting,” it noted. “The injected code looks like ordinary analytics next to the store’s real tags, but loads a payment skimmer that steals credit card numbers, CVVs, and billing addresses from checkout.”

Per Sansec, Funnel Builder includes a publicly exposed checkout endpoint that allows an incoming request to choose the type of internal method to run. However, older versions were designed such that they never checked the caller’s permissions or limited which methods are allowed to be invoked.

A bad actor could exploit this loophole by issuing an unauthenticated request that can reach an unspecified internal method that writes attacker-controlled data directly into the plugin’s global settings. The added code snippet is then injected into every Funnel Builder checkout page.

As a result, an attacker could plant a malicious

In at least one case, Sansec said it observed a payload masquerading as a Google Tag Manager (GTM) loader to launch JavaScript hosted on a remote domain. It subsequently opens a WebSocket connection to the attacker’s command-and-control (C2) server (“wss://protect-wss[.]com/ws”) to retrieve a skimmer that’s tailored to the victim’s storefront.

The end goal of the attack is to siphon credit card numbers, CVVs, billing addresses, and other personal information that could be entered by site visitors at checkout. Site owners are advised to update the Funnel Builder plugin to the latest version and review Settings > Checkout > External Scripts for anything that’s unfamiliar and remove it.

“Dressing skimmers up as Google Analytics or Tag Manager code is a
recurring Magecart pattern
, since reviewers tend to skim straight past anything that looks like a familiar tracking tag,” Sansec said.

The disclosure comes weeks after Sucuri detailed a campaign in which Joomla websites are being backdoored with heavily obfuscated PHP code to contact attacker-controlled C2 servers, receive and process instructions sent by the operators, and serve spammy content to visitors and search engines without the site owner’s knowledge. The ultimate aim is to leverage the sites’ reputation for injecting spam.

“The script acts as a remote loader,” security researcher Puja Srivastava
said
. “It contacts an external server, sends information about the infected website, and waits for instructions. The response from the remote server determines what content the infected site should serve.”

“This approach allows attackers to change the behavior of the compromised website at any time without modifying the local files again. The attacker can inject spam product links, redirect visitors, or display malicious pages dynamically.”

You Might Also Like

Sony Xperia 1 VIII AI Camera Assistant Internet Outrage

How to Control Everything on Your Phone With Your Voice (iOS and Android)

Critical Nginx UI auth bypass flaw now actively exploited in the wild

Irish quantum start-up Equal1 unveils RacQ data centre computer

AirPods Pro 3 Leak: New ‘Visual Intelligence’ Cameras Revealed

TAGGED: Cyber Security, Cybersecurity, data breach, E-commerce Security, Internet, JavaScript, Magecart, Skimming, Vulnerability, WooCommerce, WordPress
Share This Article
Facebook Twitter Copy Link
Previous Article Oil markets could be a month away from the moment of truth. Brace for a ‘non-linear’ price spike and panic buying, analysts warn
Next Article This FTSE 250 stock just hit $2 for the first time since 2022
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

China's marriages drop to decade low, deepening demographic concerns
Business
US law firm files motion requesting redistribution of $344M USDt linked to Iran
Crypto
London police out in force as tens of thousands attend rival rallies
World News
KelpDAO: rsETH Records $936k Net Outflows One Month Post-Hack – Details
Crypto
A giant ‘cosmic laser’ just reached Earth after 8 billion years
World News
Sony Xperia 1 VIII AI Camera Assistant Internet Outrage
Tech News
Potato futures soar 700% in less than a month on Iran war speculation
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

Brussels unveils plans for a European Degree but struggles to explain why

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
Trump evokes more anger and fear from Democrats than Biden does from Republicans, AP-NORC poll shows
March 28, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?