cPanel and WHM Authentication Bypass Vulnerability (CVE-2026-41940)
An authentication bypass vulnerability in cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 allows unauthenticated remote attackers to gain unauthorized access to the control panel.
On April 28, 2026, a critical authentication bypass vulnerability (CVE-2026-41940) was disclosed affecting cPanel and WHM. This vulnerability impacts versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5. The vulnerability exists within the login flow, allowing unauthenticated remote attackers to bypass authentication and gain unauthorized access to the control panel. Successful exploitation grants attackers complete control over the affected cPanel and WHM instances, potentially leading to data theft, server compromise, and further malicious activities. This vulnerability poses a significant risk to web hosting providers and their customers.
Attack Chain
- An unauthenticated attacker sends a crafted HTTP request to the cPanel/WHM login page, exploiting the authentication bypass vulnerability.
- The vulnerable cPanel/WHM version fails to properly validate the request, allowing the attacker to bypass the login process.
- The attacker gains unauthorized access to the cPanel/WHM interface.
- The attacker enumerates the server to identify valuable files, directories, and database configurations.
- The attacker leverages the compromised cPanel/WHM access to upload malicious scripts or binaries.
- The attacker executes uploaded payloads to establish persistent access, such as a web shell.
- The attacker uses the web shell to perform arbitrary commands on the server, including escalating privileges.
- The attacker exfiltrates sensitive data, defaces websites, or deploys ransomware.
Impact
Successful exploitation of CVE-2026-41940 can lead to complete compromise of cPanel and WHM servers. This can result in data breaches, website defacement, and denial-of-service attacks. The vulnerability affects a wide range of cPanel and WHM installations, potentially impacting thousands of web hosting providers and their customers. The high CVSS score (9.8) reflects the severity of the risk and the ease with which it can be exploited.
Recommendation
- Immediately upgrade cPanel and WHM installations to versions 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, or 11.136.0.5, or later to patch CVE-2026-41940.
- Monitor web server logs for unusual activity and unauthorized access attempts to the cPanel/WHM interface by deploying the Sigma rule
DetectCpanelAuthBypassAccess. - Implement strict access control policies to limit access to cPanel/WHM administrative interfaces and monitor the user activity by deploying the Sigma rule
DetectCpanelAccountManipulation.
Detection coverage 2
Detect Cpanel Authentication Bypass Access
criticalDetects potential exploitation attempts of the cPanel authentication bypass vulnerability (CVE-2026-41940) by monitoring access to the login page with unusual parameters or methods.
Detect Cpanel Account Manipulation
highDetects creation, modification, or deletion of user accounts within cPanel, which may indicate post-exploitation activity.
Detection queries are kept inside the platform. Get full rules →