Banking Sessions Hijacked: Taboola’s Pixel Redirects Users to Temu, Exposing Security Gaps

Unveiling the Hidden Passenger: How Taboola Redirects Banking Sessions to Temu

In a recent cybersecurity revelation, a European financial institution discovered that a Taboola pixel, which they had approved, was clandestinely redirecting logged-in users to a Temu tracking endpoint. This redirection occurred without the bank’s awareness, without user consent, and without triggering any security alerts.

The First-Hop Bias Blind Spot

A critical vulnerability in many security systems, including Web Application Firewalls (WAFs), static analyzers, and standard Content Security Policies (CSPs), is their tendency to evaluate only the declared origin of a script, neglecting the runtime destination of its request chain. For instance, if `sync.taboola.com` is included in a CSP allow-list, the browser deems the request legitimate. However, it does not re-validate the final destination after a 302 redirect. Consequently, when the browser reaches `temu.com`, it inherits the trust initially granted to Taboola.

The Forensic Trace

During a February 2026 audit of the bank’s platform, cybersecurity firm Reflectiz identified a specific redirect chain executing on authenticated account pages:

1. Initial Request: A GET request to `https://sync.taboola.com/sg/temurtbnative-network/1/rtb/`.
2. The Redirect: The server responded with a 302 Found status, redirecting the browser to `https://www.temu.com/api/adx/cm/pixel-taboola?…`.
3. The Payload: The redirect included the header `Access-Control-Allow-Credentials: true`.

This header instructs the browser to include cookies in the cross-origin request to Temu’s domain. As a result, Temu can read or write tracking identifiers associated with a browser that has accessed an authenticated banking session.

Why Conventional Tools Missed It

Traditional security tools failed to detect this issue due to inherent limitations:

– WAFs: These tools inspect inbound traffic but often miss outbound browser-side redirects.
– Static Analysis: While they can identify Taboola code in the source, they cannot predict runtime 302 destinations.
– CSP Allow-lists: Trust is transitive; once the first hop is approved, the browser automatically follows the redirect chain without re-validation.

The Regulatory Fallout

For regulated entities, the absence of direct credential theft does not mitigate compliance exposure. Users were not informed that their banking session behavior would be linked to a tracking profile held by PDD Holdings, constituting a transparency failure under GDPR Article 13. Additionally, the data routing involves infrastructure in a non-adequate country. Without Standard Contractual Clauses covering this specific fourth-party relationship, the data transfer is unsupported under GDPR Chapter V. Claiming ignorance of the pixel’s behavior is not a viable defense for a data controller under Article 24.

The Payment Card Industry Data Security Standard (PCI DSS) exposure further complicates the situation. A redirect chain ending at an unanticipated fourth-party domain falls outside the scope of any review that evaluated only the primary vendor, precisely the gap that Requirement 6.4.3 aims to close.

Inspect Runtime, Not Just Declarations

Currently, the same Taboola pixel configuration operates on thousands of websites. The pertinent question is not whether such redirect chains are occurring—they are—but whether your security infrastructure can see beyond the first hop or if it stops at the approved domain and considers the job done.

For security teams: focus on inspecting runtime behavior, not just declared vendor lists.

For legal and privacy teams: recognize that browser-level tracking chains on authenticated pages require the same scrutiny as backend integrations.

The threat entered through the front door. Your CSP allowed it in.