Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Actively exploited funnel builder flaw allows WooCommerce checkout skimming

$60 billion AI chip darling Cerebras consumes $8 million a month and nearly dies an early death

Users turn to jailbreaking older Kindles as Amazon ends support

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Actively exploited funnel builder flaw allows WooCommerce checkout skimming
Identity

Actively exploited funnel builder flaw allows WooCommerce checkout skimming

By May 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 16, 2026Vulnerabilities / Website Security

A critical security vulnerability affecting the Funnel Builder plugin for WordPress has been exploited to inject malicious JavaScript code into WooCommerce checkout pages with the purpose of stealing payment data.

Details of the activities were announced by Sunsec this week. This vulnerability currently does not have a formal CVE identifier. Affects all versions of the plugin prior to 3.15.0.3. Used by over 40,000 WooCommerce stores.

The flaw allows an unauthenticated attacker to inject arbitrary JavaScript into any checkout page on a store, the Dutch e-commerce security company said. FunnelKit, which manages Funnel Builder, has released a patch for the vulnerability in version 3.15.0.3.

“The attacker embeds a fake Google Tag Manager script in the plugin’s ‘external scripts’ settings,” the paper said. “The injected code looks like normal analytics next to the store’s actual tag, but it loads a payment skimmer that steals credit card numbers, CVVs, and billing addresses from the checkout.”

According to Sansec, Funnel Builder includes an exposed checkout endpoint that allows you to choose the type of internal method that incoming requests execute. However, older versions were designed not to check the caller’s permissions or restrict which methods were allowed to be called.

A malicious attacker could exploit this loophole by issuing an unauthenticated request that reaches an unspecified internal method that writes attacker-controlled data directly to the plugin’s global configuration. The added code snippet will be inserted into every checkout page in Funnel Builder.

As a result, an attacker could plant a malicious program.

Sansec said that in at least one case, it observed a payload masquerading as a Google Tag Manager (GTM) loader that launched JavaScript hosted on a remote domain. It then opens a WebSocket connection to the attacker’s command and control (C2) server (‘wss://protect-wss’).[.]com/ws”) to obtain a skimmer tailored to the victim’s storefront.

The ultimate goal of the attack is to siphon credit card numbers, CVV, billing addresses, and other personal information that site visitors may enter during checkout. Site owners should update the Funnel Builder plugin to the latest version and[設定]>[チェックアウト]>[外部スクリプト]We recommend that you check if there are any unfamiliar items and delete them.

“Disguising skimmers as Google Analytics or Tag Manager code is a common pattern we see with Magecart, as reviewers tend to just skip over what looks like a familiar tracking tag,” Sansec said.

This disclosure comes weeks after Sucuri detailed a campaign in which Joomla websites were backdoored with highly obfuscated PHP code that contacted attacker-controlled C2 servers, received and processed instructions sent by operators, and served spam content to visitors and search engines without the site owners’ knowledge. The ultimate goal is to capitalize on the reputation of spamming sites.

“The script acts as a remote loader,” said security researcher Puja Srivastava. “It connects to an external server, sends information about the infected website, and waits for instructions. The response from the remote server determines what content the infected site serves.”

“This approach allows an attacker to change the behavior of a compromised website at any time without having to modify local files again. The attacker can insert spam product links, redirect visitors, or dynamically display malicious pages.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article$60 billion AI chip darling Cerebras consumes $8 million a month and nearly dies an early death

Related Posts

Turla turns Kazuar backdoor into modular P2P botnet for persistent access

May 15, 2026

Four OpenClaw flaws allow data theft, privilege escalation, and persistence

May 15, 2026

What you can learn about your real attack surface by observing your tools for 45 days

May 15, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Actively exploited funnel builder flaw allows WooCommerce checkout skimming

$60 billion AI chip darling Cerebras consumes $8 million a month and nearly dies an early death

Users turn to jailbreaking older Kindles as Amazon ends support

RJ Scaringe has raised more than $12 billion across three startups, but investors are still looking for more money

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.