WordPress Funnel Builder Plugin Misused to Hijack Credit Card Information

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.
  • Hackers are exploiting a significant vulnerability within the Funnel Builder plugin to embed credit card skimmers in e-commerce checkout interfaces.
  • FunnelKit has issued a corrective update, yet over half of live sites continue to operate on outdated, susceptible versions.
  • The illicitly acquired payment details are being sold on the dark web and utilized for fraudulent advertisement transactions.

Cybercriminals are taking advantage of a grave security gap in a widely used WordPress plugin to pilfer credit card credentials from unsuspecting online shoppers.

Security analysts from Sansec disclosed that they have detected an active scheme targeting websites employing the Funnel Builder plugin, which reportedly supports over 40,000 e-commerce platforms.

This plugin enables businesses to effortlessly craft sales pipelines, landing pages, optimized checkout processes, upsells, and lead-generation strategies, all sans coding expertise.

Sansec identified a critical vulnerability, still awaiting a specific CVE designation, which permits threat actors to insert malicious JavaScript fragments into WooCommerce checkout pages without any authentication barriers.

As reported by the researchers, this flaw has been exploited to integrate a credit card skimmer capable of harvesting credit card numbers, CVVs, billing addresses, and various customer data.

Addressing the Vulnerability

While the extent of compromised websites remains uncertain, the stolen data is sufficient for perpetrating fraudulent online transactions.

In many instances, stolen credentials are offloaded on the dark web to the highest bidder, with cybercriminals frequently utilizing these illicitly obtained cards for ad purchases on legitimate advertisement networks, thereby promoting malware that may lead to ransomware assaults.

Much of the malware and information-stealing advertisements observed on commercial platforms like Google are typically financed through pilfered credit cards and compromised Google Ads accounts.

ecommerce-shopping-cart-credit-debit-card-payment-online

Subsequently, FunnelKit (the developer of the plugin) has resolved the issue and released an updated version—3.15.0.3. All users are strongly urged to upgrade immediately to safeguard their websites.

As of the latest check, approximately 50.3% of all websites are still operating on earlier builds of Funnel Builder, indicating that at least 20,000 sites remain vulnerable.

The remaining 49.7% are reported to be using version 3.15, leaving the exact number of patched sites unclear; thus, the risk may be even greater.

Source link: Techradar.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

Souvik Banerjee

I’m Souvik Banerjee from Kolkata, India. As a Marketing Manager at RS Web Solutions (RSWEBSOLS), I specialize in digital marketing, SEO, programming, web development, and eCommerce strategies. I also write tutorials and tech articles that help professionals better understand web technologies.
Share the Love
Related News Worth Reading