A critical bug in the Funnel Builder (FunnelKit) plugin for WordPress, used to customize WooCommerce payment pages, is being exploited freely to insert malicious JavaScript fragments into the checkout and thus steal customer payment data. Vulnerability allows, without authentication, to modify the overall plugin configuration through a publicly exposed checkout endpoint, which turns any store that uses versions prior to 3.15.0.3 into a target for card skimmers.
Public metrics indicate that Funnel Builder is active in tens of thousands of sites, so the risk is wide: an attacker can inject code into the "External Scripts" adjustment of the plugin and get an external script loaded on all payment pages. According to the technical analysis published by Sansec, attackers distribute a file that passes through Google Tag Manager / Google Analytics and opens a WebSocket connection to download and run a custom skimmer that collects card numbers, CVV, billing addresses and other buyer data. For technical details and samples of the analysis, see Sansec's original report at https: / / sansec.io / research / funnelkit-woocommerce-violability-exploited.

If you run a WooCommerce store, you must assume that it may have been compromised if you used the Channel Builder before 3.15.0.3.. The first immediate step is to update the plugin from the WordPress panel to the corrected version (3.15.0.3 or above). The official plugin page in the WordPress repository contains version information and allows you to check active facilities: https: / / wordpress.org / plugins / funnel-builder /. Do not postpone this update: automated exploits are often spread quickly once vulnerability is made public.
Updating alone is not enough if the attacker already had time to insert malicious scripts. Check the Settings > Checkout > External Scripts section of the plugin for unauthorized entries and remove any foreign URL or code. In addition, it inspects database files and options for recent changes in plugin settings and checkout hooks; skimmers often leave traces in adjustment inputs or in custom options.
You must also take risk for customer data: inform compliance officers (e.g. the payment gateway provider and PCI compliance equipment if applicable), prepare a statement for affected customers if exfiltration is confirmed and consider forcing the rotation of payment-related keys or credentials. It monitors transactions and fraud patterns and, if you detect fraudulent charges, coordinates the response with the gateway and card issuers.

On the technical level, it activates records and analysis of outgoing traffic to identify applications to suspicious domains (e.g. domains similar to analytics-reports [.] com or WebSocket connections to external hosts such as protect-wss [.] com mentioned in the reports). It implements time rules in the WAF to block the load of scripts from unauthorized external sources and applies integrity controls in the files and the database to detect reincidences. If you don't have the internal capacity, hire an incident response team with e- commerce experience.
This incident is a reminder that plugins that manipulate the payment flow are a critical vector: the security of a store depends not only on the WordPress core but on each extension that has permissions on the checkout. Keep an inventory of plugins, apply updates quickly, limit administrative privileges and auditory configurations that allow external scripts to run. For best security practices in payments and compliance, see the PCI DSS guidelines at https: / / www.pcisecuritystandards.org / and hardening resources of WordPress and WooCommerce platforms published by specialized security providers.
If you need practical help to audit an affected facility or to design a mediation and communication plan, consider contacting incident response specialists and skimmers cleaning providers that offer forensic traffic analysis and safe recovery of e-commerce environments.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...