Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Update Your cPanel Server to Fix Critical Vulnerability

Update Your cPanel Server to Fix Critical Vulnerability

Posted on April 29, 2026 By CWS

cPanel has announced the release of critical security patches to resolve an authentication vulnerability that could potentially allow unauthorized access to their control panel software. This issue affects all active versions, prompting administrators to update their servers promptly.

Affected Versions and Urgent Recommendations

According to cPanel’s official alert, the vulnerability impacts all versions currently in use. The security updates are specifically available for versions 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.136.0.5, and 11.134.0.20. Administrators running unsupported versions are strongly advised to upgrade their systems to receive the patch.

cPanel has not disclosed detailed technical information about the vulnerability. However, it has stressed the critical nature of updating servers to mitigate potential risks. Web hosting provider Namecheap has confirmed that the issue involves an authentication login exploit, potentially granting unauthorized access to the control panel.

Preventive Measures and Ongoing Monitoring

In response to the threat, Namecheap has implemented a temporary firewall rule to block access to TCP ports 2083 and 2087. This measure is intended to limit customer access to cPanel and WHM interfaces, reducing the risk of exploitation until a comprehensive fix is deployed.

Namecheap has assured its customers that it is closely monitoring the situation and plans to apply the official patch to all supported servers immediately upon availability. The company has committed to restoring full access to control panels as soon as the update is implemented.

Current Status and Next Steps

As of April 29, 2026, at 02:42 a.m. UTC, the patch has been successfully applied to Reseller and Stellar Business servers, among others, as reported by the Namecheap Support Team. Administrators are urged to ensure their servers are updated to prevent any potential unauthorized access.

Moving forward, it is crucial for server administrators to remain vigilant and apply security updates as they are released. Keeping software up-to-date is a fundamental practice in safeguarding systems against emerging vulnerabilities and ensuring the security of web hosting environments.

The Hacker News Tags:Authentication, control panel, cPanel, Firewall, Namecheap, patch deployment, security update, server security, TCP ports, Vulnerability, web hosting

Post navigation

Previous Post: VECT 2.0 Ransomware: A Destructive Threat to Data
Next Post: Checkmarx Supply Chain Attack Leads to Data Breach

Related Posts

Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs Microsoft Fixes 80 Flaws — Including SMB PrivEsc and Azure CVSS 10.0 Bugs The Hacker News
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts The Hacker News
AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar The Hacker News
UNC6692 Uses Teams to Spread SNOW Malware UNC6692 Uses Teams to Spread SNOW Malware The Hacker News
Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows Tsundere Botnet Expands Using Game Lures and Ethereum-Based C2 on Windows The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Exposed VNC Servers Threaten Industrial Control Systems
  • Choosing the Right Exposure Management Platform
  • LofyStealer Targets Minecraft Players with Advanced Tactics
  • Checkmarx Supply Chain Attack Leads to Data Breach
  • Update Your cPanel Server to Fix Critical Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Exposed VNC Servers Threaten Industrial Control Systems
  • Choosing the Right Exposure Management Platform
  • LofyStealer Targets Minecraft Players with Advanced Tactics
  • Checkmarx Supply Chain Attack Leads to Data Breach
  • Update Your cPanel Server to Fix Critical Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark