A severe flaw in the Funnel Builder WordPress plugin is being leveraged by attackers to inject malicious JavaScript code into WooCommerce checkout pages, allowing them to steal sensitive credit card information. The vulnerability enables threat actors to intercept and capture payment data, potentially leading to financial fraud and identity theft. The Funnel Builder plugin, used by numerous e-commerce websites, has become a prime target for malicious actors seeking to exploit its weaknesses. As a result, website administrators using this plugin are at risk of compromise, emphasizing the need for immediate patching and monitoring of their sites for suspicious activity1. This exploitation highlights the importance of maintaining up-to-date plugins and software to prevent such security breaches. So what matters most to security practitioners is the urgent need to address this vulnerability to prevent further credit card theft and protect sensitive user data.
Funnel Builder WordPress plugin bug exploited to steal credit cards
⚠️ Critical Alert
Why This Matters
Security developments continue reshaping the threat landscape — staying informed is the first line of defense.
References
- BleepingComputer. (2026, May 15). Funnel Builder WordPress plugin bug exploited to steal credit cards. *BleepingComputer*. https://www.bleepingcomputer.com/news/security/funnel-builder-wordpress-plugin-bug-exploited-to-steal-credit-cards/
Original Source
BleepingComputer
Read original →