WooCommerce Stores Under Attack via Funnel Builder Flaw
Attackers exploit unauthenticated vulnerability in Funnel Builder plugin to inject payment skimmers on 40,000+ WordPress stores. Patch to 3.15.0.3 immediately.
A critical vulnerability in the Funnel Builder plugin for WordPress is being actively exploited to inject credit card skimmers on WooCommerce checkout pages. Security researchers at Sansec published details of the campaign this week after observing attackers targeting more than 40,000 online stores running the vulnerable plugin.
The flaw allows unauthenticated attackers to write arbitrary JavaScript directly into the plugin's global settings. That injected code then executes on every checkout page, silently capturing payment details and exfiltrating them to attacker-controlled infrastructure.
How Attackers Are Exploiting the Flaw
The vulnerability exists in a publicly exposed checkout endpoint that lacks proper permission validation. Attackers can issue unauthenticated HTTP requests that reach an internal method capable of modifying the plugin's configuration without any authorization checks.
Once inside, the attack chain works like this:
- Initial access: Attacker sends crafted request to vulnerable endpoint
- Configuration injection: Malicious JavaScript written to the plugin's "External Scripts" setting
- Persistent skimming: Code executes on every Funnel Builder checkout page automatically
- Data exfiltration: Skimmer opens WebSocket connection to
wss://protect-wss[.]com/wsto retrieve additional payloads and transmit stolen data
The attackers plant code disguised as legitimate Google Tag Manager scripts—a common technique for blending malicious activity with expected analytics traffic. The final payload harvests credit card numbers, CVVs, billing addresses, and any other information entered at checkout.
Which Stores Are Affected
Funnel Builder is a popular sales funnel and landing page builder for WooCommerce, used by over 40,000 active installations. Any store running versions before 3.15.0.3 is vulnerable.
The attack is particularly insidious because it requires no user interaction beyond normal checkout behavior. Customers have no way to detect the skimmer—the malicious code runs invisibly alongside legitimate page functionality.
This campaign continues a broader trend of payment-focused WordPress attacks. Earlier this year, we covered similar exploitation patterns targeting WooCommerce stores, where attackers combined multiple access vectors to extract customer payment data at scale.
Immediate Actions for Store Owners
FunnelKit, the company behind Funnel Builder, has released version 3.15.0.3 to address the vulnerability. Store owners should:
- Update immediately to Funnel Builder 3.15.0.3 or later
- Audit your External Scripts setting — Navigate to Settings > Checkout > External Scripts and remove any unfamiliar code
- Search for suspicious domains — Look for references to
protect-wss.comor other unfamiliar WebSocket endpoints - Review transaction logs — Check for unauthorized transactions or customer complaints about fraud
- Consider notifying affected customers if you find evidence of compromise
For guidance on recognizing suspicious scripts, see our phishing email examples guide which covers common attacker techniques for disguising malicious payloads.
The Magecart Problem Won't Go Away
Payment skimming attacks—often grouped under the "Magecart" umbrella—remain one of the most persistent threats to e-commerce. Unlike ransomware that announces its presence, skimmers operate silently, sometimes for months before detection.
The attack model works because:
- E-commerce platforms run complex plugin ecosystems with varying security quality
- Store owners often lack security expertise to audit their installations
- Payment data offers immediate monetization through fraud or resale
- Attribution is difficult when attacks route through multiple compromised hosts
Organizations managing WooCommerce deployments should implement regular security audits, monitor for unauthorized configuration changes, and consider web application firewalls capable of detecting injection attempts. The OWASP guide to Magecart attacks provides additional hardening recommendations.
Supply chain attacks targeting developer tools show similar patterns—the recent node-ipc compromise demonstrated how attackers increasingly target the software distribution channels themselves rather than individual deployments.
Related Articles
Smart Slider Hijacked: 900K WordPress Sites Get Backdoored
Attackers compromised Nextend's update infrastructure to push a malicious Smart Slider 3 Pro version with four layers of backdoors. Here's who's affected and how to recover.
Apr 9, 2026Vidar Infostealer Spreads via Hacked WordPress Sites
Malwarebytes researchers detected a Vidar infostealer campaign using fake CAPTCHA pages on compromised WordPress sites. ClickFix technique tricks users into running malicious PowerShell.
Mar 28, 2026WebRTC Skimmer Bypasses CSP to Steal Payment Data from E-Commerce
A new payment skimmer uses WebRTC data channels instead of HTTP to exfiltrate stolen card data, bypassing Content Security Policy controls on Magento stores.
Mar 27, 2026250+ WordPress Sites Compromised to Deliver Infostealers via ClickFix
Global campaign hijacks WordPress sites in 12 countries to serve fake Cloudflare CAPTCHAs that deploy Vidar, VodkaStealer, and other credential theft malware.
Mar 16, 2026