Funnel Builder WordPress plugin bug exploited to steal credit cards (wordpress)

Written by: Terry Arthur  • 

“`json
{
“title”: “URGENT: Funnel Builder Plugin Vulnerability & Credit Card Risk”,
“content”: “

URGENT: Funnel Builder Plugin Vulnerability & Credit Card Security

\n\n

As a leading web development and IT consulting firm based in the U.S. Virgin Islands, Terry Arthur Consulting is committed to keeping our clients informed and protected. We’re writing to you today with an urgent security alert regarding a critical vulnerability discovered in the popular WordPress plugin, Funnel Builder.

\n\n

This vulnerability poses a significant risk to websites using the plugin, potentially allowing malicious actors to steal sensitive information, including credit card details. We urge you to take immediate action to mitigate this threat. This post will detail the issue, the potential impact, and the steps you need to take to protect your business.

\n\n

The Funnel Builder Plugin Vulnerability: What You Need to Know

\n\n

The Funnel Builder plugin, used by many businesses to create sales funnels, landing pages, and other conversion-focused elements, has been found to contain a security flaw that can be exploited by hackers. This flaw allows attackers to bypass security measures and potentially access sensitive data stored on your website, including:

\n\n

    \n

  • Credit Card Information: This is the most critical risk. If your website processes payments through Funnel Builder, hackers could potentially gain access to credit card numbers, expiration dates, and security codes.
  • \n

  • Customer Data: Attackers could access customer names, email addresses, phone numbers, and other personal information collected through your funnels.
  • \n

  • Website Control: In some cases, the vulnerability could allow attackers to gain control of your WordPress website, potentially leading to defacement, data deletion, or the installation of malware.
  • \n

\n\n

The specific details of the vulnerability are intentionally being kept somewhat vague to prevent further exploitation. However, the core issue lies in the plugin’s code, which allows for unauthorized access. This means that if your website uses an outdated version of Funnel Builder, it’s vulnerable.

\n\n

Why This Matters & The Impact on Your Business

\n\n

The consequences of a security breach can be devastating for any small business. Beyond the immediate financial losses associated with fraudulent transactions, a data breach can:

\n\n

    \n

  • Damage Your Reputation: Losing customer trust can be difficult and costly to rebuild. A security breach can severely damage your brand’s reputation.
  • \n

  • Lead to Legal and Regulatory Penalties: Depending on the type of data compromised, you could face fines and legal action under regulations like GDPR, CCPA, and others.
  • \n

  • Disrupt Operations: Recovering from a breach takes time and resources, disrupting your business operations and potentially leading to lost revenue.
  • \n

  • Increase Insurance Premiums: After a breach, your cyber insurance premiums will likely increase.
  • \n

\n\n

The bottom line? This is a serious threat that requires immediate action.

\n\n

What You Need to Do IMMEDIATELY

\n\n

Here’s a step-by-step guide to protect your website and your customers:

\n\n

1. Check Your Funnel Builder Plugin Version

\n\n

The first step is to determine if you have the Funnel Builder plugin installed on your WordPress website. If you do, check the version number. You can find this information in your WordPress dashboard under “Plugins.”

\n\n

    \n

  • If you have the Funnel Builder plugin installed, proceed to step 2.
  • \n

  • If you do not have the Funnel Builder plugin installed, you are not directly affected by this specific vulnerability. However, it’s always a good practice to keep all your plugins updated.
  • \n

\n\n

2. Update the Plugin (Recommended)

\n\n

The most effective way to address the vulnerability is to update the Funnel Builder plugin to the latest version. This will include the security patch released by the developers to fix the flaw. Follow these steps:

\n\n

    \n

  1. Log in to your WordPress dashboard.
  2. \n

  3. Go to “Plugins.”
  4. \n

  5. If an update is available for Funnel Builder, click “Update Now.” If you do not see an update, you may already have the patched version.
  6. \n

  7. After the update is complete, check that your website is functioning correctly.
  8. \n

\n\n

3. Remove the Plugin (Alternative, if Update is Not Possible or You’re Unsure)

\n\n

If you cannot update the plugin immediately (due to compatibility issues or other reasons) or are unsure if the update is successful, the safest option is to remove the plugin entirely. This will eliminate the vulnerability. However, keep in mind this will also disable your funnels, so weigh your options carefully.

\n\n

    \n

  1. Log in to your WordPress dashboard.
  2. \n

  3. Go to “Plugins.”
  4. \n

  5. Deactivate the Funnel Builder plugin.
  6. \n

  7. Delete the Funnel Builder plugin.
  8. \n

\n\n

Important Note: If you remove the plugin, you will need to find an alternative for your sales funnels. There are many excellent WordPress funnel builders available, such as Elementor Pro, Thrive Architect, or other specialized plugins. We can assist you with selecting and implementing an alternative if needed. Contact us at the end of this post to request help.

\n\n

4. Review Your Security Practices

\n\n

This incident is a reminder that website security is an ongoing process, not a one-time fix. Here are some best practices to implement to protect your website from future threats:

\n\n

    \n

  • Keep WordPress, Themes, and Plugins Updated: This is the single most important step you can take. Updates often include security patches that address known vulnerabilities.
  • \n

  • Use Strong Passwords: Encourage strong, unique passwords for all user accounts, including admin accounts.
  • \n

  • Implement Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a verification code from a separate device.
  • \n

  • Install a Security Plugin: Plugins like Wordfence, Sucuri, or iThemes Security can provide additional protection, including malware scanning, firewall protection, and intrusion detection.
  • \n

  • Regularly Back Up Your Website: In the event of a breach, you can restore your website from a backup. Ensure your backups are stored securely (offsite is recommended).
  • \n

  • Monitor Your Website

Terry Arthur

AI Enhanced Developer

Terry Arthur builds AI-enhanced development workflows, WordPress solutions, and compliance tools for businesses that want to ship faster without cutting corners. Based in the U.S. Virgin Islands, he helps teams automate the tedious and focus on the creative.

How Healthy Is Your WordPress Site?

Get a free, brutally honest assessment of your site's performance, security, and code quality. No automated scanner — a real developer reviews your site and sends you actionable recommendations within hours.