<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CPanel &amp; WHM — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cpanel--whm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 12:16:14 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cpanel--whm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Authentication Bypass Vulnerability in cPanel &amp; WHM (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cpanel-auth-bypass/</link><pubDate>Thu, 30 Apr 2026 12:16:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is a critical authentication bypass vulnerability in cPanel &amp; WHM, allowing unauthenticated remote attackers to gain administrative access by manipulating session data.</description><content:encoded><![CDATA[<p>A critical authentication bypass vulnerability, CVE-2026-41940, affects all versions of cPanel &amp; WHM. This vulnerability allows unauthenticated remote attackers to gain administrative access to affected systems due to improper handling of session data. Public technical analyses and proof-of-concept code are available, significantly lowering the barrier to exploitation. There are indications that the vulnerability has been actively exploited in the wild, potentially as a zero-day. cPanel &amp; WHM is commonly exposed to the internet and manages hosting environments, making it an attractive target for attackers seeking control over hosting infrastructures and numerous websites.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a cPanel &amp; WHM server exposed to the internet.</li>
<li>The attacker crafts a malicious HTTP request targeting the cPanel &amp; WHM login endpoint.</li>
<li>The crafted request manipulates session creation and processing by injecting controlled data into the session files.</li>
<li>This injected data alters authentication-related attributes within the session, bypassing the normal authentication flow.</li>
<li>The attacker successfully establishes a session that is treated as fully authenticated without providing valid credentials.</li>
<li>With administrative privileges, the attacker gains full control over the cPanel server.</li>
<li>The attacker accesses hosted websites and databases, potentially compromising sensitive data.</li>
<li>The attacker establishes persistence through backdoors or additional user accounts, ensuring continued access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 allows attackers to gain complete control over cPanel &amp; WHM servers. This can lead to the compromise of hosted websites, databases, and sensitive customer data. Given the central role of cPanel in hosting environments, this vulnerability can result in large-scale compromise affecting multiple customers and services. The widespread use of cPanel &amp; WHM makes this a high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by cPanel to address CVE-2026-41940 immediately after thorough testing to prevent exploitation.</li>
<li>Implement increased monitoring and detection capabilities to identify suspicious activity related to CVE-2026-41940 as recommended by CCB.</li>
<li>Review web server logs for unusual patterns or requests targeting cPanel login endpoints to detect potential exploitation attempts. Create a Sigma rule based on webserver logs.</li>
<li>Monitor for unauthorized changes to user accounts or the creation of new administrative accounts on cPanel servers. Create a Sigma rule based on process creation logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>authentication bypass</category><category>cPanel</category><category>web hosting</category><category>vulnerability</category></item><item><title>WebPros cPanel &amp; WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)</title><link>https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cpanel-auth-bypass/</guid><description>CVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel &amp; WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.</description><content:encoded><![CDATA[<p>WebPros cPanel &amp; WHM (WebHost Manager) and WP2 (WordPress Squared) are affected by an authentication bypass vulnerability, identified as CVE-2026-41940. This flaw exists within the login flow, potentially granting unauthenticated remote attackers unauthorized access to the control panel. Successful exploitation allows attackers to bypass normal authentication mechanisms and directly access sensitive administrative functions within cPanel &amp; WHM and WP2. Defenders should apply vendor-provided mitigations or discontinue use of the product if mitigations are not available. The vulnerability was disclosed in April 2026, and mitigations should be applied by May 3, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable cPanel &amp; WHM or WP2 instance.</li>
<li>The attacker crafts a malicious HTTP request exploiting the authentication bypass vulnerability in the login flow.</li>
<li>The request is sent to the target server, bypassing authentication checks.</li>
<li>The server incorrectly processes the request, granting the attacker an authenticated session.</li>
<li>The attacker leverages the authenticated session to access administrative interfaces and settings.</li>
<li>The attacker modifies server configurations, potentially creating new administrative accounts.</li>
<li>The attacker installs malicious plugins or software through the control panel.</li>
<li>The attacker achieves full control over the web server and hosted websites.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41940 can lead to complete compromise of the affected cPanel &amp; WHM or WP2 server. This can result in data breaches, website defacement, malware distribution, and denial-of-service attacks. The impact is significant due to the widespread use of cPanel &amp; WHM in web hosting environments. Compromised servers could be leveraged for further attacks against other systems and networks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply mitigations provided by WebPros as detailed in their security update advisory to address CVE-2026-41940.</li>
<li>Deploy the Sigma rule &ldquo;Detect cPanel/WHM Authentication Bypass Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>If mitigations cannot be immediately applied, follow BOD 22-01 guidance for cloud services, potentially isolating the affected system until patched.</li>
<li>Consider discontinuing use of the affected product if patches or mitigations are unavailable, as advised in the original CISA KEV entry.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cpanel</category><category>whm</category><category>wp2</category><category>wordpress</category><category>authentication-bypass</category><category>cve-2026-41940</category><category>initial-access</category></item></channel></rss>