Vulnerabilities & CVEs

WooCommerce Skimmers Exploit Funnel Builder Flaw

The digital storefront is under siege again, and this time it's a popular WordPress plugin bleeding customer payment data. Active exploitation means the threat isn't hypothetical; it's happening now.

A graphic illustration of a shopping cart with a lock icon and a warning symbol, representing e-commerce security vulnerabilities.

Key Takeaways

  • A critical vulnerability in WordPress Funnel Builder is actively being exploited to skim payment data from WooCommerce checkouts.
  • Attackers inject malicious JavaScript disguised as analytics scripts to steal credit card numbers, CVVs, and billing addresses.
  • Store owners using versions prior to 3.15.0.3 are strongly advised to update the plugin immediately and audit their external script settings.

Look, the expectation was simple: build a slick, user-friendly checkout experience, and customers will flock. Funnel Builder promised just that, a tool to optimize conversion rates for tens of thousands of WooCommerce stores. But the narrative has dramatically shifted. What was meant to streamline sales is now a gaping security hole, actively exploited to siphon credit card details and billing addresses right out of the checkout flow.

This isn’t some theoretical vulnerability. Sansec, a firm that monitors e-commerce threats, confirmed this week that attackers are already weaponizing a flaw in the Funnel Builder plugin. The details are stark: unauthenticated attackers can inject malicious JavaScript into WooCommerce checkout pages. This code then masquerades as legitimate analytics, like Google Tag Manager scripts, while secretly loading a payment skimmer.

The Mechanics of the Magecart Mimic

Here’s the technical breakdown, which is frankly, quite ingenious in its malice. The vulnerability stems from an older design choice in Funnel Builder’s publicly exposed checkout endpoint. Older versions, specifically those prior to 3.15.0.3, failed to properly check caller permissions or restrict which internal methods could be invoked. This oversight allows an unauthenticated attacker to send a request that targets a specific internal method. This method, critically, writes attacker-controlled data directly into the plugin’s global settings. Once this injected code snippet is in place, it’s served on every Funnel Builder checkout page. Simple, devastating.

The end goal of the attack is to siphon credit card numbers, CVVs, billing addresses, and other personal information that could be entered by site visitors at checkout.

This modus operandi is a recurring pattern we’ve seen from Magecart-style groups. They know that store owners, and even automated security scanners, tend to glance over anything that looks like familiar tracking or analytics code. Planting a skimmer disguised as a Google Analytics or Tag Manager script is, therefore, a highly effective tactic to fly under the radar.

Why Does This Matter for WooCommerce Store Owners?

For the estimated 40,000+ WooCommerce stores using this plugin, the implications are immediate and severe. This isn’t a future threat; it’s a present danger. Every transaction processed through an unpatched Funnel Builder installation could be compromised. The stolen data—credit card numbers, CVVs, billing addresses—is the golden ticket for cybercriminals, enabling identity theft, fraudulent purchases, and significant financial loss for both the customer and the merchant.

The fact that there isn’t yet a formal CVE identifier doesn’t diminish the threat; it merely highlights the speed at which these exploits are often discovered and deployed by malicious actors before official tracking catches up. Sansec observed payloads masquerading as Google Tag Manager loaders, communicating with a command-and-control server via WebSockets to retrieve tailored skimmers for the specific victim storefront. This level of customization suggests a sophisticated operation, not a blunt-force attack.

The Obvious Fix: Update. Now.

FunnelKit, the maintainer of Funnel Builder, has released version 3.15.0.3, which includes a patch for this vulnerability. The advice from security researchers is unequivocal: update immediately. Beyond updating, store owners are strongly advised to meticulously review their Settings > Checkout > External Scripts section for any unfamiliar entries and remove them. It’s a manual check that could save a business from catastrophic data breach fallout.

This incident serves as yet another stark reminder of the inherent risks in relying on third-party plugins, especially those deeply integrated into critical transactional pathways like checkout. While the convenience and feature sets are undeniable, the security posture of the entire ecosystem hinges on the diligence of developers and the proactive updating by end-users.

There’s a tendency to view these vulnerabilities as isolated incidents, technical glitches. But when they’re actively exploited, they become direct assaults on consumer trust and business viability. The dynamic nature of e-commerce security means that the battlefield constantly shifts, and complacency is the attacker’s best ally. Keeping systems patched and configurations clean isn’t just good practice; it’s an existential necessity in today’s interconnected digital marketplace.


🧬 Related Insights

Frequently Asked Questions

What does the Funnel Builder vulnerability allow attackers to do?

It allows attackers to inject malicious JavaScript code into WooCommerce checkout pages, enabling them to steal payment card data and billing information entered by customers.

Is there a patch available for the Funnel Builder vulnerability?

Yes, FunnelKit has released version 3.15.0.3 of the Funnel Builder plugin which addresses this security flaw.

Should I be worried if I use the Funnel Builder plugin on my WooCommerce store?

If you are using a version prior to 3.15.0.3 and haven’t updated, you are at risk. It’s critical to update the plugin immediately and review your external script settings for suspicious entries.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

What does the Funnel Builder vulnerability allow attackers to do?
It allows attackers to inject malicious JavaScript code into WooCommerce checkout pages, enabling them to steal payment card data and billing information entered by customers.
Is there a patch available for the Funnel Builder vulnerability?
Yes, FunnelKit has released version 3.15.0.3 of the Funnel Builder plugin which addresses this security flaw.
Should I be worried if I use the Funnel Builder plugin on my WooCommerce store?
If you are using a version prior to 3.15.0.3 and haven't updated, you are at risk. It's critical to update the plugin immediately and review your external script settings for suspicious entries.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.