Attack Surface Management
,
Security Operations
Critical Flaw Needs Patching in Widely-Used, Shared Hosting Infrastructure Software

Tens of thousands of online dashboards controlling servers and web hosting accounts appear to have been compromised by attackers exploiting a recently announced, critical vulnerability.
See Also: AI Turning Tool Sprawl Into an Attack Surface
The team behind the cPanel graphical interface and the WHM web host manager detailed Tuesday a security flaw in its Linux software and published a patch along with detailed remediation instructions, indicators of compromise as well as a detection script.
The flaw, tracked as CVE-2026-41940, has a CVSS base score of 9.8, reflecting that it can be used by an authenticated attacker to remotely execute code on a server running the vulnerable Linux software.
The vulnerable programs “contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel, warned the U.S. Cybersecurity and Infrastructure Security Agency.
CISA added the flaw to its Known Exploited Vulnerabilities catalog on Thursday, setting a deadline of this Tuesday for federal civilian agencies to remediate the flaw, or else temporarily discontinue using the software until they’ve done so.
First launched in 1997, cPanel and WHM are now developed and maintained by Swiss web hosting software and automation firm WebPros. The shared hosting infrastructure software runs on an estimated 70 million websites.
All supported versions of cPanel and WHM, as well as the WP Squared WordPress management tool, sport the vulnerability and need to be patched. All versions of the software since 11.40, released in December 2023, have the vulnerability, although it’s likely present in older versions too.
“Warning: If your server is not running a supported version of cPanel that is eligible for this update, it is highly recommended that you work toward updating your server as soon as possible, as it may also be affected,” cPanel said.
“WHM is the administrative interface – root-level access to the server, SSL certificates, security protocols, the lot – and cPanel is the user-facing panel for individual hosting accounts,” explained threat intelligence firm watchTowr, which on Wednesday published a technical analysis of the flaw together with a proof-of-concept exploit.
“Think of it as the keys to the kingdom, and then the keys to every individual apartment inside the kingdom. If the kingdom was the internet and the apartments were websites. For everything,” it said.
Cybersecurity firm Rapid7 said Shodan searches suggested that as of Thursday, about 1.5 million cPanel vulnerable instances remained internet-exposed.
The Shadowserver Foundation, a non-profit cybersecurity organization, said its honeypots on Thursday recorded scans tied to 44,000 cPanel installations “likely compromised” with CVE-2026-41940. Of these, 15,200 traced to U.S. IP addresses, followed by over 4,000 in France and Germany, and 2,000 each in Canada, India, the Netherlands, Singapore and the United Kingdom.
“Organizations running on-premise instances of cPanel & WHM or WP Squared should prioritize upgrading to a fixed version on an emergency basis. Some hosting providers have opted to temporarily institute workaround TCP port blocks for cPanel & WHM web services on ports 2083 and 2087. However, defenders are strongly advised to patch, rather than implement workarounds,” Rapid7 said.
One challenge for many of the individuals who will be using cPanel control panel software is that it often gets supplied by their web hosting provider, meaning most “depend on their hosting provider to patch,” said cybersecurity firm Hadrian.
The risk isn’t just that a single piece of control panel software gets popped.
“WHM grants root administrative access to the server. An attacker with this access can read every customer hosting account, modify files and databases, create backdoor accounts, install malware, steal credentials and pivot into customer networks,” Hadrian said.
