top of page

Hidden Passenger: Taboola's Routing of Authenticated Banking Sessions to Temu Exposed

  • 1 hour ago
  • 3 min read

Key Findings


  • A European bank's approved Taboola pixel silently redirected authenticated users to a Temu tracking endpoint without bank knowledge or user consent

  • The redirect chain exploited "first-hop bias" — security tools validate the declared origin domain but not the runtime destination of 302 redirects

  • Temu's tracking pixel included Access-Control-Allow-Credentials headers, enabling cross-origin cookie access to the banking session

  • Standard security controls including WAFs, CSP policies, and static analysis failed to detect the redirect chain

  • GDPR transparency violations occurred under Article 13, with unauthorized data transfers to PDD Holdings lacking adequate contractual protections

  • PCI DSS compliance gaps exist because fourth-party redirect destinations fall outside typical vendor scope reviews


Background


During a February 2026 audit of a European financial platform, security researchers identified an undisclosed redirect chain executing on authenticated banking pages. A pixel from sync.taboola.com, which appeared in the bank's Content Security Policy allow-list, was routing user sessions to Temu's tracking infrastructure. The bank had approved Taboola's services but had no awareness that the pixel would redirect to external domains or that this would occur when users were logged into sensitive banking systems.


The First-Hop Bias Blind Spot


Most security stacks evaluate only the declared origin of scripts, not where those scripts actually send data. If a domain like sync.taboola.com appears on your CSP allow-list, the browser considers requests from that domain legitimate. However, when that domain responds with a 302 redirect, the browser automatically follows it to the terminal destination without re-validating trust.


By the time the browser reaches temu.com, it has already inherited the trust originally granted to Taboola. Security teams see the approved vendor in logs and assume everything is working as intended. They rarely inspect what happens after the first hop.


The Forensic Trace


The redirect chain captured during the audit revealed a specific attack pattern. The initial request went to https://sync.taboola.com/sg/temurtbnative-network/1/rtb/. The server responded with a 302 Found status, redirecting to https://www.temu.com/api/adx/cm/pixel-taboola with specific query parameters.


The critical detail was the Access-Control-Allow-Credentials header included in the redirect response. This header tells the browser to include cookies in the cross-origin request to Temu's domain. In this context, it meant Temu could now read or write tracking identifiers against a browser it knew had just accessed an authenticated banking session. The bank's session tokens remained on the user's machine, but Temu's tracking infrastructure now had a mapping between that browser and the banking activity.


Why Conventional Tools Missed It


Web Application Firewalls inspect inbound traffic to the bank's servers. They cannot see outbound browser-side redirects that users' browsers execute after receiving a 302 response.


Static source code analysis sees the Taboola code in the HTML and JavaScript but cannot predict or trace runtime 302 destination chains. A pixel tag looks the same whether it redirects to analytics or to tracking networks.


Content Security Policy allow-lists assume trust is not transitive. If sync.taboola.com is approved, the browser automatically follows its 302 redirects without asking the CSP for permission again. Once the first hop is approved, the redirect chain executes without additional validation.


The Regulatory Exposure


For regulated financial institutions, this incident creates compounding compliance failures. GDPR Article 13 requires data controllers to inform users about processing purposes and recipients before collection. Users were never told their banking session behavior would be associated with a tracking profile held by PDD Holdings, Temu's parent company.


The data transfer itself involves infrastructure in a non-adequate country without Standard Contractual Clauses covering this specific fourth-party relationship. Under GDPR Chapter V, such transfers lack legal support. The bank cannot defend itself by claiming ignorance under Article 24, which explicitly holds data controllers responsible for understanding their processing chains.


PCI DSS compliance compounds the problem. Redirect chains terminating at unanticipated fourth-party domains fall outside the scope of any compliance review that evaluated only primary vendors. Requirement 6.4.3 exists specifically to prevent this scenario, yet the redirect happened undetected.


Implications for Security Teams


The same Taboola pixel configuration runs on thousands of websites. This incident is not an anomaly but likely a pattern. The question is not whether redirect chains like this are happening, but whether security stacks can see past the first hop or whether they stop at the approved domain and mark it as compliant.


Security teams need to shift from validating declared vendor lists to inspecting actual runtime behavior. Browser-level redirect chains on authenticated pages warrant the same rigor as backend API integrations. A pixel that redirects to an unapproved domain is functionally equivalent to allowing direct API calls to that domain, yet it bypasses most monitoring.


For privacy and legal teams, the lesson is similar. The threat entered through the front door via an approved marketing tool. Standard CSP configuration let it through because policies were written without understanding transitive trust in redirect chains.


Sources


  • https://thehackernews.com/2026/04/hidden-passenger-how-taboola-routes.html

  • https://www.cypro.se/2026/04/16/hidden-passenger-how-taboola-routes-logged-in-banking-sessions-to-temu/

  • https://www.socdefenders.ai/item/4af2e365-3ebe-48d5-9aab-e61cd444ee37

  • https://x.com/shah_sheikh/status/2044745673384587265

  • https://x.com/TheCyberSecHub/status/2044746269709791504

Recent Posts

See All

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page