Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical cPanel Vulnerability Exploited for Months

Critical cPanel Vulnerability Exploited for Months

Posted on April 30, 2026 By CWS

A critical cPanel & WHM authentication bypass vulnerability has been actively exploited for months, posing significant risks to countless servers globally. This vulnerability, identified as CVE-2026-41940 with a CVSS score of 9.8, was publicly disclosed on April 28. cPanel has since urged immediate patching of all software versions post 11.40, although detailed technical information remains undisclosed.

Understanding the Vulnerability

This security flaw impacts the login process, potentially enabling remote attackers to gain administrative access without authentication. Such unauthorized access could lead to full system control, compromising server configurations and all hosted websites. The Canadian Centre for Cyber Security emphasizes the severity, noting that successful exploitation permits attackers to manipulate server settings and potentially jeopardize multiple websites on shared hosting environments.

Impact and Response

Cybersecurity firm Rapid7 highlights the vulnerability’s potential reach, with approximately 1.5 million cPanel instances accessible on the internet. Attack surface management company WatchTowr discovered that the vulnerability allows attackers to exploit a failed login attempt by manipulating session files through cookie modifications. This method could enable attackers to inject credentials and gain unauthorized access.

Evidence of the vulnerability being exploited in the wild dates back to February 23, 2026, according to a Reddit post by KnownHost. In response, major hosting providers like KnownHost, HostPapa, InMotion, and Namecheap swiftly restricted access to cPanel & WHM ports to facilitate secure patch deployment. The necessary fixes have since been incorporated into several cPanel & WHM versions, ranging from 11.86.0.41 to 11.136.0.5, and WP Squared version 136.1.7.

Mitigation and Future Considerations

cPanel advises users to update to supported software versions to mitigate risks associated with this flaw. They have released a detection script, and WatchTowr has provided a Detection Artifact Generator to aid in identifying signs of compromise. Such tools are crucial for administrators aiming to secure their systems against potential attacks.

Moving forward, it is imperative for web hosting services and server administrators to remain vigilant, ensuring their systems are equipped with the latest security updates. Rapid response and regular patching are essential strategies in safeguarding against evolving cybersecurity threats.

Security Week News Tags:authentication bypass, cPanel, CVE-2026-41940, Cybersecurity, Patch, Rapid7, server security, system takeover, Vulnerability, WatchTowr, web hosting, WHM, zero-day

Post navigation

Previous Post: Hackers Exploit Qinglong RCE Vulnerabilities
Next Post: KarstoRAT Malware Threatens with Extensive Control Abilities

Related Posts

Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Security Week News
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ Security Week News
In Other News: LockBit 5.0, Department of War Cybersecurity Framework, OnePlus Vulnerability In Other News: LockBit 5.0, Department of War Cybersecurity Framework, OnePlus Vulnerability Security Week News
Recent Langflow Vulnerability Exploited by Flodrix Botnet Recent Langflow Vulnerability Exploited by Flodrix Botnet Security Week News
700Credit Data Breach Impacts 5.8 Million Individuals 700Credit Data Breach Impacts 5.8 Million Individuals Security Week News
Memcyco Raises  Million for Anti-Impersonation Technology Memcyco Raises $37 Million for Anti-Impersonation Technology Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical ProFTPD Vulnerability Allows Remote Code Execution
  • Gemini CLI Security Flaw Could Lead to Supply Chain Attacks
  • Stealthy Python Backdoor Targets Cloud Credentials
  • Critical ConnectWise ScreenConnect Flaw Under Exploitation
  • EnOcean SmartServer Security Flaws Threaten Remote Hacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical ProFTPD Vulnerability Allows Remote Code Execution
  • Gemini CLI Security Flaw Could Lead to Supply Chain Attacks
  • Stealthy Python Backdoor Targets Cloud Credentials
  • Critical ConnectWise ScreenConnect Flaw Under Exploitation
  • EnOcean SmartServer Security Flaws Threaten Remote Hacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark