Home

Description

Funnel Builder for WooCommerce Checkout prior to 3.15.0.3 contains a missing authorization vulnerability in the public checkout endpoint that allows unauthenticated attackers to invoke internal methods and write arbitrary data to the plugin's External Scripts global setting. Attackers can inject malicious JavaScript through the External Scripts setting that executes in the browsers of all checkout page visitors.

PUBLISHED Reserved 2026-05-18 | Published 2026-05-19 | Updated 2026-05-19 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Problem types

Missing Authorization

Product status

Default status
affected

Any version before 3.15.0.3
affected

References

sansec.io/...h/funnelkit-woocommerce-vulnerability-exploited exploit

sansec.io/...h/funnelkit-woocommerce-vulnerability-exploited technical-description

plugins.trac.wordpress.org/...lass-wfacp-ajax-controller.php patch

www.vulncheck.com/...checkout-missing-authorization-via-ajax third-party-advisory

cve.org (CVE-2026-47100)

nvd.nist.gov (CVE-2026-47100)

Download JSON