Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    May 16, 2026

    Should employees be worried that training AI tools could mean they teach the software how to do their jobs?

    May 16, 2026

    Fundamental and Technical Advances in Bulk Photovoltaics of 2D van der Waals Materials

    May 16, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
    IT/ Cybersecurity

    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    big tee tech hubBy big tee tech hubMay 16, 2026003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Ravie LakshmananMay 16, 2026Vulnerability / Website Security

    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    A critical security vulnerability impacting the
    Funnel Builder
    plugin for WordPress has come under active exploitation in the wild to
    inject malicious JavaScript code
    into WooCommerce checkout pages with the goal of stealing payment data.

    Details of the activity were
    published
    by Sansec this week. The vulnerability currently does not have an official CVE identifier. It affects all versions of the plugin before 3.15.0.3. It’s used in more than 40,000 WooCommerce stores. 

    The flaw lets unauthenticated attackers inject arbitrary JavaScript into every checkout page on the store, the Dutch e-commerce security company said. FunnelKit, which maintains Funnel Builder, has released a patch for the vulnerability in version 3.15.0.3.

    “Attackers are planting fake Google Tag Manager scripts into the plugin’s ‘External Scripts’ setting,” it noted. “The injected code looks like ordinary analytics next to the store’s real tags, but loads a payment skimmer that steals credit card numbers, CVVs, and billing addresses from checkout.”

    Per Sansec, Funnel Builder includes a publicly exposed checkout endpoint that allows an incoming request to choose the type of internal method to run. However, older versions were designed such that they never checked the caller’s permissions or limited which methods are allowed to be invoked.

    A bad actor could exploit this loophole by issuing an unauthenticated request that can reach an unspecified internal method that writes attacker-controlled data directly into the plugin’s global settings. The added code snippet is then injected into every Funnel Builder checkout page.

    As a result, an attacker could plant a malicious

    In at least one case, Sansec said it observed a payload masquerading as a Google Tag Manager (GTM) loader to launch JavaScript hosted on a remote domain. It subsequently opens a WebSocket connection to the attacker’s command-and-control (C2) server (“wss://protect-wss[.]com/ws”) to retrieve a skimmer that’s tailored to the victim’s storefront.

    The end goal of the attack is to siphon credit card numbers, CVVs, billing addresses, and other personal information that could be entered by site visitors at checkout. Site owners are advised to update the Funnel Builder plugin to the latest version and review Settings > Checkout > External Scripts for anything that’s unfamiliar and remove it.

    “Dressing skimmers up as Google Analytics or Tag Manager code is a
    recurring Magecart pattern
    , since reviewers tend to skim straight past anything that looks like a familiar tracking tag,” Sansec said.

    The disclosure comes weeks after Sucuri detailed a campaign in which Joomla websites are being backdoored with heavily obfuscated PHP code to contact attacker-controlled C2 servers, receive and process instructions sent by the operators, and serve spammy content to visitors and search engines without the site owner’s knowledge. The ultimate aim is to leverage the sites’ reputation for injecting spam.

    “The script acts as a remote loader,” security researcher Puja Srivastava
    said
    . “It contacts an external server, sends information about the infected website, and waits for instructions. The response from the remote server determines what content the infected site should serve.”

    “This approach allows attackers to change the behavior of the compromised website at any time without modifying the local files again. The attacker can inject spam product links, redirect visitors, or display malicious pages dynamically.”



    Source link

    Active Builder Checkout enables exploitation Flaw Funnel Skimming woocommerce
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Fresh mischief and digital shenanigans

    May 16, 2026

    Glycan atlassing enables functional tracing of cell state

    May 15, 2026

    Accelerate Your Career and Impact with CCNA Certifications

    May 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    May 16, 2026

    Should employees be worried that training AI tools could mean they teach the software how to do their jobs?

    May 16, 2026

    Fundamental and Technical Advances in Bulk Photovoltaics of 2D van der Waals Materials

    May 16, 2026

    Agent Harness Engineering – O’Reilly

    May 16, 2026
    Timer Code
    15 Second Timer for Articles
    20
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Funnel Builder Flaw Under Active Exploitation Enables WooCommerce Checkout Skimming

    May 16, 2026

    Should employees be worried that training AI tools could mean they teach the software how to do their jobs?

    May 16, 2026

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2026 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.