{"id":8092,"date":"2026-05-02T18:31:37","date_gmt":"2026-05-02T16:31:37","guid":{"rendered":"https:\/\/yoota.it\/en\/critical-cpanel-flaw-let-attackers-bypass-authentication-for-months\/"},"modified":"2026-05-02T18:31:40","modified_gmt":"2026-05-02T16:31:40","slug":"critical-cpanel-flaw-let-attackers-bypass-authentication-for-months","status":"publish","type":"post","link":"https:\/\/yoota.it\/en\/critical-cpanel-flaw-let-attackers-bypass-authentication-for-months\/","title":{"rendered":"Critical cPanel Flaw Let Attackers Bypass Authentication for Months"},"content":{"rendered":"\n<p>When cPanel released its security bulletin on April 28, attacks were already underway for at least two months. KnownHost&#8217;s CEO confirmed this after finding the first exploitation attempts in their logs dating back to February 23. The vulnerability, now tracked as CVE-2026-41940 with a severity score of 9.8 out of 10, affects all supported versions of cPanel and WHM, the control panel managing tens of millions of websites worldwide.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How it worked<\/h3>\n\n\n\n<p>The mechanics were deceptively simple. cPanel writes a session file to disk for every login attempt, before even verifying credentials. The flaw was right there: by manipulating a session cookie with special characters, attackers could inject an arbitrary property into the session file, like <code>user=root<\/code>. When the session loaded next time, the system found an authentication marker already in place, skipped the password check, and granted full admin access. No credentials needed.<\/p>\n\n\n\n<p>With roughly 1.5 million cPanel instances exposed on the internet, the potential blast radius is enormous. This isn&#8217;t just about the site owner&#8217;s server: on a shared hosting environment, a single compromised server can pull down hundreds of customer sites with it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What to do now<\/h3>\n\n\n\n<p><strong>If you&#8217;re on shared hosting<\/strong>, you likely can&#8217;t easily discover which cPanel version your provider is running. The most practical approach is to look for communications from your host about updates, or contact support directly asking whether CVE-2026-41940 has been patched. Providers like Namecheap and Hostgator have already publicly confirmed they&#8217;ve updated their systems.<\/p>\n\n\n\n<p><strong>If you manage a VPS or dedicated server<\/strong> with cPanel, checking is straightforward: the current version appears at the top of your WHM panel. The patched versions released on April 28 are: <code>11.110.0.97<\/code>, <code>11.118.0.63<\/code>, <code>11.126.0.54<\/code>, <code>11.132.0.29<\/code>, <code>11.134.0.20<\/code>, and <code>11.136.0.5<\/code>. To update via command line, run <code>\/scripts\/upcp --force<\/code>. If you&#8217;re using WP Squared, the WordPress hosting panel built on cPanel, upgrade to version 136.1.7.<\/p>\n\n\n\n<p>As a temporary measure while waiting for updates, blocking inbound traffic on ports 2083, 2087, 2095, and 2096 reduces exposure. cPanel has also released a detection script for those wanting to check whether their session files already show signs of unauthorized access.<\/p>\n\n\n\n<p>The U.S. CISA added CVE-2026-41940 to its list of actively exploited vulnerabilities, requiring U.S. federal agencies to apply the patch by May 3.<\/p>\n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/techcrunch.com\/2026\/04\/30\/hackers-are-actively-exploiting-a-bug-in-cpanel-used-by-millions-of-websites\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        techcrunch.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/www.helpnetsecurity.com\/2026\/04\/30\/cpanel-zero-day-vulnerability-cve-2026-41940-exploited\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        helpnetsecurity.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/labs.watchtowr.com\/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        labs.watchtowr.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/cyberscoop.com\/cpanel-authentication-bypass-vulnerability-cve-2026-41940-exploited\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        cyberscoop.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n","protected":false},"excerpt":{"rendered":"<p>A critical flaw in cPanel and WHM allowed attackers to bypass authentication and gain full server access. Exploited since February, the patch rolled out April 28. Here&#8217;s how to check if your hosting is protected.<\/p>\n","protected":false},"author":2,"featured_media":8091,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"italian_url":"https:\/\/yoota.it\/cpanel-falla-critica-nellautenticazione-gli-attacchi-erano-gia-in-corso-da-mesi\/","yoota_meta_description":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[12,49],"tags":[693,272,694,695],"class_list":["post-8092","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-hosting","tag-cpanel","tag-security","tag-vulnerability","tag-web-hosting"],"_links":{"self":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/8092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/comments?post=8092"}],"version-history":[{"count":1,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/8092\/revisions"}],"predecessor-version":[{"id":8094,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/8092\/revisions\/8094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media\/8091"}],"wp:attachment":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media?parent=8092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/categories?post=8092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/tags?post=8092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}