24X7 Whatsapp Support & Call Support: +91 7681044239
A critical authentication bypass vulnerability affecting cPanel & WHM has been actively exploited in the wild. Learn how to secure your server, apply emergency updates, rotate SSH keys, and detect possible compromise indicators.
A critical security vulnerability identified as CVE-2026-41940 has recently affected cPanel & WHM servers worldwide. The vulnerability carries a CVSS score of 9.8, making it one of the most severe cPanel security incidents in recent years.
Security researchers and hosting providers have confirmed that the vulnerability has already been actively exploited in the wild before the official public disclosure.
Administrators using cPanel & WHM are strongly advised to update their servers immediately.
cPanel officially released an emergency security advisory and patched versions on April 28, 2026.
Official advisory:
The vulnerability impacts:
CVE-2026-41940 is a critical authentication bypass vulnerability affecting cPanel & WHM.
The vulnerability allows unauthenticated remote attackers to bypass authentication and potentially gain administrative access to the server without valid credentials.
Researchers identified that the issue originates from improper session handling and insufficient sanitization during authentication processing.
If successfully exploited, attackers may:
According to multiple security reports, exploitation activity had already started weeks before the public disclosure.
cPanel has released patched versions for all supported branches.
Any server running versions older than the patched releases should be considered vulnerable.
Several hosting providers and cybersecurity researchers observed active exploitation attempts targeting unpatched servers.
Some attacks reportedly involved:
This is the highest priority action.
Do not delay updates.
If the server was exposed:
Attackers may have accessed:
/root/.ssh/id_rsa/root/.ssh/authorized_keysGenerate new SSH keys and revoke old ones immediately.