cpanel hacking

What Happened?

A dangerously simple authentication bypass vulnerability has been discovered in cPanel & WHM, the control panel software powering millions of web hosting servers worldwide. Security researchers have confirmed that unauthenticated attackers can remotely gain full administrative control over vulnerable servers without ever needing a username or password.

The vulnerability, officially indexed as CVE-2026-41940, resides in how the software processes session management requests. By inserting carefully crafted newline characters into authentication calls, attackers can effectively fool the system into granting them root-level privileges.

The Worst Part: It’s Already Being Exploited

Here’s what makes this alert urgent — this wasn’t a quiet discovery. Threat actors have been actively exploiting this flaw since late February 2026, nearly two full months before the public received any warning. Security firms have observed automated scanning campaigns attempting to identify exposed cPanel installations across the internet.

Proof-of-concept exploit code has since been released publicly, meaning even low-skilled attackers can now compromise unpatched servers with minimal effort.

Who Is Affected?

If you are running any of the following cPanel & WHM versions, your server is vulnerable:

If you are running any of the following cPanel & WHM versions, your server is vulnerable:

Version Branch Minimum Safe Version
11.86 11.86.0.41
11.110 11.110.0.97
11.118 11.118.0.63
11.126 11.126.0.54
11.130 11.130.0.19
11.132 11.132.0.29
11.134 11.134.0.20

What Attackers Can Do After Exploitation

Once an attacker successfully triggers this vulnerability, they gain unfiltered access to the WebHost Manager interface with full root capabilities. From there, they can:

  • View and modify every website hosted on the server
  • Extract all customer databases and email accounts
  • Install backdoors, cryptocurrency miners, or ransomware
  • Use the compromised server as a launchpad to attack other systems
  • Disable security software and erase audit logs to cover their tracks

For shared hosting providers, the damage multiplies — a single compromised server can expose thousands of individual customers simultaneously.

Your Action Plan — Do This Today

Step One: Patch Immediately

Log into your server via SSH and run:

bash
/scripts/upcp --force

After completion, restart cPanel services and verify your version matches the safe releases listed above.

Step Two: If You Cannot Patch Right Away

Configure your firewall to block external access to these critical ports. Allow connections only from your trusted IP addresses:

  • 2082 and 2083 (cPanel HTTP/HTTPS)
  • 2086 and 2087 (WHM HTTP/HTTPS)
  • 2095 and 2096 (Webmail)

Be aware: Some researchers have suggested the vulnerability might also be reachable through standard port 443 via proxy configurations. Firewalling the management ports reduces risk but is not a complete solution.

Step Three: Check for Signs of Breach

cPanel has released an official detection script. Run it to scan session files located in /var/cpanel/sessions/. Watch for these suspicious indicators:

  • Session files showing both “token denied” errors and valid security tokens together
  • Session records from unauthenticated users that contain authenticated user attributes
  • Any session showing two-factor verification without proper origin validation

Step Four: If You Discover Evidence of Compromise

Take these actions immediately:

  1. Clear all active session files from /var/cpanel/sessions/

  2. Force password changes for root and all WHM user accounts

  3. Review system cron jobs, SSH authorized keys, and startup scripts for persistence mechanisms

  4. Examine /var/log/wtmp and WHM access logs for unknown IP addresses

How Widespread Is the Risk?

Internet scanning platforms reveal a sobering reality. Shodan shows approximately 1.5 million cPanel instances publicly accessible. Censys returns over 1.1 million unique hosts and more than 6.7 million associated web properties.

The good news? A small number of large hosting providers — including GoDaddy, Bluehost, Oracle Cloud, OVH, and Liquid Web — manage nearly half of all exposed cPanel servers. Their patching speed will significantly influence the overall threat landscape.

What Security Companies Are Doing

Major players have already responded:

  • Cloudflare deployed an emergency Web Application Firewall rule specifically targeting exploitation attempts
  • Assetnote released a high-accuracy scanner that avoids account lockout mechanisms
  • WatchTowr published detection tools and verification scripts on GitHub

Final Warning

This is not a theoretical vulnerability. It has a CVSS base score of 9.8 out of 10 — classified as Critical. Active exploitation is confirmed. Public exploit code is available. Every hour your server remains unpatched increases the probability of compromise.

Do not wait for a scheduled maintenance window. Patch now.

icon 01

Where We Are

P50 Plaza, 2nd Floor, Chenab Market, Susan Road, Faisalabad, Pakistan

icon 02

Tech Support

(+92)-311-4991414

icon 03

E-mail Us

sales@xoftmade.com

support@xoftmade.com