Critical cPanel and WHM bug exploited as a zero-day, PoC now available

Critical cPanel and WHM bug exploited as a zero-day, PoC now available

BleepingComputer technology

Key Points:

  • A critical authentication bypass vulnerability (CVE-2026-41940) affecting cPanel, WHM, and WP Squared has been actively exploited since at least late February 2026, with successful attacks observed before a patch was released on April 28.
  • The flaw results from a Carriage Return Line Feed (CRLF) injection in cPanel's login and session processes, allowing attackers to bypass password validation and gain control over the host system, configurations, databases, and managed websites.
  • Approximately 1.5 million cPanel instances are exposed online, though it is unclear how many are vulnerable; hosting providers like KnownHost and Namecheap have taken protective measures such as blocking relevant ports until patches were available.
  • cPanel has issued fixes for multiple affected versions and strongly recommends restarting the ‘cpsrvd’ service after patching; customers unable to patch immediately should block external access to key ports or stop core cPanel services to mitigate risk.
  • A detection script is provided by cPanel to identify compromises, and if signs of exploitation are found, users should purge sessions, reset credentials, audit logs, and investigate for persistence mechanisms.

Trending Business

Trending Technology

Trending Health