I went to the following: woocommerce\packages\woocommerce-blocks\src\Assets.php.
(This location was identified by this user – freimaks – https://wordpress.org/support/topic/why-print_script_block_data-used-on-every-page/)
Then I just deleted the following code:
add_action( ‘wp_print_footer_scripts’, array( __CLASS__, ‘print_script_block_data’ ), 1 );
Scans from Threatwise (by quterra) were flagging this chunk of code as “potentially suspicious”. This seems to have removed the code and solved my problem.
Yes -I am having the same issue with “var wc_product_block_data = JSON.parse (decodeURIComponent (“..
This is being tagged by quttera as potential suspicious file… Any solution or reason why this code is necessary? Is this a result of the latest woocommerce update?