• Home  
  • cPanel Zero-Day Actively Exploited Since February
- Cybersecurity

cPanel Zero-Day Actively Exploited Since February

CVE-2026-41940, a critical authentication bypass in cPanel and WHM, has been exploited in the wild since late February. PoC now public. Fixes rolling. Stay alert.

cPanel Zero-Day Actively Exploited Since February

Attackers have had 14 days of undetected access to thousands of Linux servers by exploiting a critical authentication bypass flaw in cPanel, WHM, and WP Squared — and they’ve been doing it since February 24, 2026.

Key Takeaways

  • The vulnerability, CVE-2026-41940, allows full root-level access without credentials.
  • Exploitation began at least as early as February 24, 2026, well before public disclosure.
  • A proof-of-concept (PoC) exploit is now publicly available, increasing risk.
  • cPanel released patches on April 28, 2026 — but many systems remain unpatched.
  • Hosting providers and developers managing self-hosted environments are most at risk.

The Backdoor That Wasn’t a Backdoor

Here’s the thing about CVE-2026-41940: it doesn’t rely on brute force, stolen credentials, or misconfigured firewalls. It’s not a logic flaw hidden in a rarely used API. It’s a direct authentication bypass built into a core component — one that lets attackers walk straight into WHM (Web Host Manager) as root, no keys required.

The flaw exists in the password reset mechanism. Under specific conditions, a specially crafted HTTP request to the /resetpass endpoint can skip verification steps entirely. That request returns a valid session token tied to the root user. And from there? Full control. File systems. Databases. SSL certificates. Email servers. All of it.

What makes this especially concerning is how quiet the initial exploitation was. There were no mass defacements. No ransomware banners. Just subtle, sustained access. Some attackers used the access to install lightweight web shells. Others exfiltrated customer databases over weeks. One hosting provider found logs showing 47 separate logins over a 10-day span — all from different IPs, all using the same exploit pattern, none triggering alerts.

Timeline of a Missed Window

Let’s map out what we know, date by date:

  • February 24, 2026: First known exploitation attempt detected by a third-party threat intelligence firm monitoring honeypots.
  • March 12, 2026: Multiple hosting providers report anomalous spikes in root session creation.
  • April 3, 2026: A security researcher submits a report to cPanel’s bug bounty program.
  • April 28, 2026: cPanel releases version 11.108.0.8, patching CVE-2026-41940.
  • May 1, 2026: Proof-of-concept code appears on GitHub, triggering immediate scanning activity.

That’s a 67-day window — nearly ten weeks — where active exploitation occurred without public awareness. The patch came only after internal validation and coordination, but the delay gave attackers a long runway. And now, with the PoC public, that runway just turned into a highway.

Why This Wasn’t Spotted Sooner

Authentication bypasses are rare in mature, widely used software like cPanel. That’s why detection systems didn’t flag the traffic. The requests looked legitimate: correct headers, valid endpoints, no malformed payloads. The only anomaly was the absence of expected verification steps — and most WAFs (web application firewalls) aren’t configured to detect missing logic, only malformed input.

Also, cPanel’s architecture assumes trust within the admin interface. Once you’re in WHM, the assumption is you’ve already cleared authentication. There’s minimal runtime validation for session origin. That design choice, stable for years, became a liability the moment the initial gate was compromised.

The PoC Changes Everything

Prior to May 1, exploitation required either access to private exploit kits or the ability to reverse-engineer internal reports. Now? Anyone with a basic understanding of cURL can run the PoC.

The script, posted under a pseudonymous account, includes detailed instructions: target URL, required headers, and even a list of known vulnerable versions. Within three hours of posting, Shodan scans showed a 300% spike in probes targeting port 2087 — WHM’s default HTTPS port.

What’s worse: the PoC includes a built-in evasion technique. It randomizes the order of parameters and uses common User-Agent strings like Mozilla/5.0 (X11; Linux x86_64) — the same ones used by automated backup scripts. That means even behavior-based detection tools might miss it.

Hosting Providers Are on the Front Lines

If you run a VPS or dedicated server with cPanel, you’re at risk. But the real pressure is on hosting providers. Many still run older, stable builds for compatibility reasons. Some haven’t applied the patch due to internal testing cycles. Others haven’t even been notified by their infrastructure teams.

One provider, hosting over 40,000 domains, confirmed on May 1 that 12% of its fleet remained unpatched. Their reasoning? “We’re validating the update against legacy billing integrations.” That’s a gamble. And right now, attackers are scanning for exactly that kind of hesitation.

Industry Response and Competitive Landscape

cPanel isn’t the only control panel in the game — but it’s still the dominant one. As of Q1 2026, it powers an estimated 58% of managed Linux web hosting environments globally, according to Netcraft. Competitors like Plesk, DirectAdmin, and open-source alternatives such as ISPConfig and CyberPanel have seen increased interest since the CVE disclosure. Plesk, for example, reported a 22% rise in migration inquiries from existing cPanel users in the first week of May. Some hosting firms, including UK-based Fasthosts and Germany’s Hetzner, have started offering free migration support to Plesk or custom Ansible-based stacks for customers seeking to reduce reliance on monolithic control panels.

Meanwhile, security vendors are scrambling. Cloudflare updated its WAF ruleset on May 2 to include detection patterns specific to the CVE-2026-41940 exploit chain. Sucuri released a free plugin to scan for signs of compromise on cPanel-hosted WordPress installations. And Tenable added the vulnerability to its critical-priority scan templates, emphasizing it as a top-tier risk for external exposure.

Yet, alternatives aren’t immune. In 2025, Plesk patched a similar authentication flaw (CVE-2025-30114) in its password recovery module, though it required additional conditions like DNS misconfigurations to be exploitable. The recurring theme? Control panels abstract complexity but often centralize risk. When one component fails, the entire administrative surface collapses.

The Bigger Picture: Why This Matters Now

This isn’t just a cPanel issue. It’s a reflection of how deeply embedded legacy software is in today’s digital infrastructure — and how fragile that foundation can be. cPanel has been around since 1997. Its user base includes millions of small businesses, freelance developers, and regional hosting providers who depend on its interface to manage websites without deep Linux expertise. That accessibility comes at a cost: long update cycles, reliance on third-party integrations, and slow patch adoption.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2026-41940 to its Known Exploited Vulnerabilities catalog on May 3, requiring federal agencies to remediate by May 17. That deadline underscores the seriousness of the flaw in government-adjacent systems, where cPanel is sometimes used in contractor-run environments.

More broadly, this event highlights the growing gap between vulnerability disclosure and real-world patching. In a 2024 study by Rapid7, 40% of internet-facing servers remained unpatched for critical flaws 60 days after a fix was available. For cPanel, automatic updates are disabled by default on many installations, leaving patching to manual intervention. And with over 200,000 estimated vulnerable servers still online as of May 5 (based on BinaryEdge scans), the attack surface remains massive.

What happens next could shape the future of web hosting security. Will we see more demand for decentralized admin tools? Increased adoption of immutable infrastructure models? Or will we keep betting on patches while the same vulnerabilities keep reappearing in different forms?

What This Means For You

If you manage or develop on cPanel-hosted environments, assume exposure. Check your version: anything below 11.108.0.8 is vulnerable. Run whmapi1 version on the command line. If it’s outdated, patch immediately — don’t wait for your provider. If you’re on shared hosting, contact support and demand confirmation of patch status. Ask for a timestamp.

Also, audit your logs. Look for unexpected sessions in WHM, especially around the /resetpass endpoint. Check for root logins from unfamiliar IPs. Rotate all credentials — not just cPanel, but MySQL, SSH, and API keys. This exploit grants full access; don’t assume only one backdoor exists if you were compromised.

There’s a quiet irony here: cPanel built its reputation on simplifying server management for non-experts. Now, that same simplicity — the abstraction from low-level security controls — has become its weakest link. We trusted the interface so completely that we stopped questioning how it granted access in the first place.

How many other admin panels rely on the same assumptions — that authentication is a one-time gate, not a continuous check? And what happens when the next PoC drops?

Sources: BleepingComputer, original report

About AI Post Daily

Independent coverage of artificial intelligence, machine learning, cybersecurity, and the technology shaping our future.

Contact: Get in touch

We use cookies to personalize content and ads, and to analyze traffic. By using this site, you agree to our Privacy Policy.