← Back to blogCybersecurity

Vulnerability in Funnel Builder Plugin Poses Risk to WooCommerce Webshops

By Assist2go20 May 2026

Source: The Hacker News

New Cyber Threat: Payment Data Theft via WooCommerce Webshops

Many entrepreneurs running a webshop via WordPress and WooCommerce need to be vigilant. A serious vulnerability has been discovered in a popular extension called Funnel Builder. This vulnerability is actively being exploited by cybercriminals to steal sensitive customer payment information.

This news is concerning, as it can have direct financial consequences for both your business and your customers.

The issue is a security flaw that allows malicious code, known as JavaScript, to be injected onto your webshop's checkout page. Without you or your customers noticing, this code can be designed to intercept credit card details, bank information, and other financial data. It is crucial to understand how this works and what steps you can take to protect your webshop.

The discoverers of this flaw, a cybersecurity firm named Sansec, have shared their findings. At present, the vulnerability does not have an official name (CVE), which sometimes occurs with new discoveries. However, this does not mean the problem is less serious; the active exploitation demonstrates the urgency.

We will explain what this entails and its importance for Small and Medium-sized Businesses (SMBs).

What Exactly is the Vulnerability?

The Funnel Builder plugin is a tool that helps webshop owners create streamlined sales processes, often referred to as 'funnels'. This involves guiding visitors through various steps until they make a purchase. Such plugins, while useful, can also provide an entry point for malicious actors if they are not properly secured.

The specific vulnerability in Funnel Builder allows hackers to add harmful code to a user's website undetected.

This harmful code, JavaScript, often appears harmless from the outside. It's a type of programming language used to make websites interactive. Malicious actors exploit this by injecting code onto the checkout page that searches for forms where payment details are entered.

When a customer enters this information, the injected code can copy this data and send it to the hacker. This process is also known as 'checkout skimming', as it resembles skimming money from a bank account.

The danger lies in the fact that this attack often goes unnoticed. The customer enters their details on a seemingly trusted website, unaware that the information is being intercepted. The webshop owner might also not notice this immediately, unless there are reports of fraud or the website itself provides security alerts.

The fact that the vulnerability is currently being actively exploited means that hackers are already targeting websites using this plugin. They are not waiting for a solution but are attempting to victimize as many users as possible. This increases the necessity for webshop owners to take immediate action.

Without protection, you run a significant risk of data theft and the associated reputational damage.

What Does This Mean for SMBs?

For many SMBs, a webshop is their primary or even sole sales channel. Customer trust is paramount here. If this trust is damaged by a security incident, the consequences can be devastating.

Payment data theft can lead to financial loss, legal troubles, and lasting damage to your reputation.

Potential Consequences for Your Webshop:

  • Financial Loss: Costs incurred for investigation, recovery efforts, and potential fines. You may also face payment chargebacks.
  • Reputational Damage: Customers lose trust in your webshop and opt for competitors. This can lead to prolonged loss of revenue.
  • Legal Issues: Depending on the situation and legislation (such as AVG/GDPR), you may face fines or liability.
  • Loss of Customer Data: Not only payment details, but potentially other personal data collected via the website, could fall into the wrong hands.
  • Blocked Payment Processing: Payment service providers may block your account due to suspicious activities, which can completely halt your business operations.

It is therefore vital that SMBs do not delay in taking measures. Purchasing a plugin like Funnel Builder comes with responsibility. This responsibility includes keeping the software up-to-date and checking for security incidents.

The complexity of cybersecurity can be intimidating for entrepreneurs who prefer to focus on their core activities. However, the impact of a successful cyberattack is so significant that investing in security is not a luxury, but a necessity. Understanding the risks and proactively addressing them is the best defense.

How Do You Protect Your Webshop?

The danger of the Funnel Builder vulnerability is that it is actively being exploited. This means there is no time to waste. The first and most important step is to check if you are using the Funnel Builder plugin in your WooCommerce webshop.

If so, immediate action is required.

Concrete Measures You Can Take:

  • Check Your Plugins: Go to the administration area of your WordPress website. Look under 'Plugins' or 'Installations' for the Funnel Builder plugin. Ensure you identify the correct plugin, especially if you use multiple similar tools.
  • Update the Plugin Immediately: If you are using the Funnel Builder plugin, the developer has likely already released a security update. Go directly to the update section in WordPress and install the latest version. This will resolve the vulnerability.
  • Consider Temporary Deactivation: If an update is not yet available, or if you doubt the update fully resolves the issue, consider temporarily deactivating the Funnel Builder plugin. This may result in certain functionalities on your website not working temporarily, but it protects you from immediate payment data theft.
  • Install a Security Plugin: Consider installing a reputable cybersecurity plugin for WordPress. These can help scan your website for malicious code, strengthen security, and detect suspicious activities.
  • Regular Backups: Ensure you regularly perform automatic backups of your website. Should something go wrong, you can restore your website to an earlier, secure state.
  • Knowledge is Key: Educate yourself and your staff about cybersecurity. Be alert to suspicious emails or activities on your website. Cybersecurity is an ongoing process that requires attention.
  • Professional Help: If you lack the technical expertise, do not hesitate to seek assistance from an IT specialist or a cybersecurity firm. They can thoroughly check and secure your website.

By following these steps, you minimize the risk of your webshop being affected by this specific vulnerability and enhance the overall security of your online presence.

Conclusion

The discovery of the vulnerability in the Funnel Builder plugin is a clear warning to all SMB entrepreneurs with a WooCommerce webshop. The risk of payment data theft is real and is currently being actively exploited. Ignoring this problem can lead to severe financial and reputational damage.

It is essential to keep your plugins updated and proactively check for security risks. Take the necessary steps today to protect your webshop and your customers' data. Your digital security is the backbone of your business operations.

**Want to know more? ** Also see how Assist2go can help with the appropriate IT service for your business.

Share this article

LinkedIn Facebook https://www.assist2go.nl/en/blog/vulnerability-in-funnel-builder-plugin-poses-risk-to-woocommerce-webshops

Need help with IT?

Assist2go helps SMEs with reliable IT, hosting, and security.

Contact us

Related articles