Back to Feed
Privacy FinesApr 16, 2026

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu

Taboola pixel redirects logged-in banking sessions to Temu tracking without consent or knowledge.

Summary

During a February 2026 audit of a European financial platform, security researchers discovered that an approved Taboola pixel was silently redirecting authenticated banking users to a Temu tracking endpoint via a 302 redirect chain, complete with credentials headers. The redirect chain exploited a "first-hop bias" vulnerability in WAFs, CSP policies, and static analyzers, which only validate the declared origin (Taboola) but fail to inspect runtime destinations. This constitutes GDPR transparency violations (Art. 13) and potential data transfer violations (Chapter V), plus PCI DSS Req. 6.4.3 breaches, as users were never informed and the fourth-party relationship involved non-adequate jurisdictions.

Full text

Hidden Passenger? How Taboola Routes Logged-In Banking Sessions to Temu The Hacker NewsApr 16, 2026Data Privacy / Compliance A bank approved a Taboola pixel. That pixel quietly redirected logged-in users to a Temu tracking endpoint. This occurred without the bank’s knowledge, without user consent, and without a single security control registering a violation. Read the full technical breakdown in the Security Intelligence Brief. Download now → The "First-Hop Bias" Blind Spot Most security stacks, including WAFs, static analyzers, and standard CSPs, share a common failure mode: they evaluate the declared origin of a script, not the runtime destination of its request chain. If sync.taboola.com is in your Content Security Policy (CSP) allow-list, the browser considers the request legitimate. However, it does not re-validate against the terminal destination of a 302 redirect. By the time the browser reaches temu.com, it has inherited the trust granted to Taboola. The Forensic Trace During a February 2026 audit of a European financial platform, Reflectiz identified the following redirect chain executing on logged-in account pages: Initial Request: A GET request to https://sync.taboola.com/sg/temurtbnative-network/1/rtb/. The Redirect: The server responded with a 302 Found, redirecting the browser to https://www.temu.com/api/adx/cm/pixel-taboola?.... The Payload: The redirect included the critical header Access-Control-Allow-Credentials: true. This header specifically instructs the browser to include cookies in the cross-origin request to Temu’s domain. This is the mechanism by which Temu can read or write tracking identifiers against a browser it now knows visited an authenticated banking session. Why Conventional Tools Missed It ```html Tool Why it Fails WAF Inspects inbound traffic only; misses outbound browser-side redirects. Static Analysis Sees the Taboola code in the source but cannot predict runtime 302 destinations. CSP Allow-lists Trust is transitive; the browser follows the redirect chain automatically once the first hop is approved. ``` The Regulatory Fallout For regulated entities, the absence of direct credential theft does not limit the compliance exposure. Users were never informed their banking session behavior would be associated with a tracking profile held by PDD Holdings — a transparency failure under GDPR Art. 13. The routing itself involves infrastructure in a non-adequate country, and without Standard Contractual Clauses covering this specific fourth-party relationship, the transfer is unsupported under GDPR Chapter V. "We didn't know the pixel did that" is not a defense available to a data controller under Art. 24. The PCI DSS exposure compounds this. A redirect chain terminating at an unanticipated fourth-party domain falls outside the scope of any review that evaluated only the primary vendor — which is precisely what Req. 6.4.3 was written to close. Inspect Runtime, Not Just Declarations Right now, the same Taboola pixel configuration runs on thousands of websites. The question isn't whether redirect chains like this are happening. They are. The question is whether your security stack can see past the first hop — or whether it stops at the domain you approved and calls it done. For security teams: inspect runtime behavior, not just declared vendor lists. For legal and privacy teams: browser-level tracking chains on authenticated pages warrant the same rigor as backend integrations. The threat entered through the front door. Your CSP let it in. The full technical evidence log is in the Security Intelligence Brief. Download it here → Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE     Tweet Share Share Share SHARE  Compliance, Content Security Policy, cybersecurity, data privacy, GDPR, PCI DSS, technology, web security Trending News Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released Apple Expands iOS 18.7.7 Update to More Devices to Block DarkSword Exploit Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials New SparkCat Variant in iOS, Android Apps Steals Crypto Wallet Recovery Phrase Images Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS Block the Prompt, Not the Work: The End of "Doctor No" BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks ⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exploits, Paragon Spyware and More China-Linked Storm-1175 Exploits Zero-Days to Rapidly Deploy Medusa Ransomware New GPUBreach Attack Enables Full CPU Privilege Escalation via GDDR6 Bit-Flips Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems AI Will Change Cybersecurity. Humans Will Define Its Success. A Lesson No Algorithm Can Teach The AI Arms Race – Why Unified Exposure Management Is Becoming a Boardroom Priority Popular Resources Learn How to Block Breached Passwords in Active Directory Before Attacks Get Full Visibility into Vendor and Internal Risk in One Platform [Guide] Get Practical Steps to Govern AI Agents with Runtime Controls Secure Your AI Systems Across the Full Lifecycle of Risks

Indicators of Compromise

  • url — https://sync.taboola.com/sg/temurtbnative-network/1/rtb/
  • url — https://www.temu.com/api/adx/cm/pixel-taboola
  • domain — sync.taboola.com
  • domain — www.temu.com

Entities

Taboola (vendor)Temu (vendor)PDD Holdings (vendor)Content Security Policy (CSP) (technology)Reflectiz (vendor)