Skip to content
Threat Feed
critical threat exploited

Critical Authentication Bypass Vulnerability in cPanel & WHM (CVE-2026-41940)

CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel & WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.

A critical authentication bypass vulnerability, CVE-2026-41940, affects all versions of cPanel & WHM. This vulnerability allows unauthenticated remote attackers to gain administrative access to affected systems due to improper handling of session data. Public technical analyses and proof-of-concept code are available, significantly lowering the barrier to exploitation. There are indications that the vulnerability has been actively exploited in the wild, potentially as a zero-day. cPanel & WHM is commonly exposed to the internet and manages hosting environments, making it an attractive target for attackers seeking control over hosting infrastructures and numerous websites.

Attack Chain

  1. An unauthenticated attacker identifies a cPanel & WHM server exposed to the internet.
  2. The attacker crafts a malicious HTTP request targeting the cPanel & WHM login endpoint.
  3. The crafted request manipulates session creation and processing by injecting controlled data into the session files.
  4. This injected data alters authentication-related attributes within the session, bypassing the normal authentication flow.
  5. The attacker successfully establishes a session that is treated as fully authenticated without providing valid credentials.
  6. With administrative privileges, the attacker gains full control over the cPanel server.
  7. The attacker accesses hosted websites and databases, potentially compromising sensitive data.
  8. The attacker establishes persistence through backdoors or additional user accounts, ensuring continued access to the compromised system.

Impact

Successful exploitation of CVE-2026-41940 allows attackers to gain complete control over cPanel & WHM servers. This can lead to the compromise of hosted websites, databases, and sensitive customer data. Given the central role of cPanel in hosting environments, this vulnerability can result in large-scale compromise affecting multiple customers and services. The widespread use of cPanel & WHM makes this a high-impact vulnerability.

Recommendation

  • Apply the security patch provided by cPanel to address CVE-2026-41940 immediately after thorough testing to prevent exploitation.
  • Implement increased monitoring and detection capabilities to identify suspicious activity related to CVE-2026-41940 as recommended by CCB.
  • Review web server logs for unusual patterns or requests targeting cPanel login endpoints to detect potential exploitation attempts. Create a Sigma rule based on webserver logs.
  • Monitor for unauthorized changes to user accounts or the creation of new administrative accounts on cPanel servers. Create a Sigma rule based on process creation logs.

Detection coverage 2

Detect Suspicious cPanel Login Attempts via POST Request

high

Detects suspicious POST requests to the cPanel login page, potentially indicating exploitation of CVE-2026-41940.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detect cPanel Account Creation from Unfamiliar IPs

medium

Detects cPanel account creation events originating from previously unseen IP addresses. This may indicate unauthorized access after CVE-2026-41940 exploitation.

sigma tactics: persistence techniques: T1136 sources: process_creation, linux

Detection queries are kept inside the platform. Get full rules →