Posted in

Warning: Critical cPanel 0-Day Hijacks Servers — Patch Now to Prevent Root Compromise

The global web hosting industry is on high alert following the discovery of a critical 0-day vulnerability in cPanel & WHM. Tracked as CVE-2026-41940, this flaw carries a near-perfect CVSS score of 9.8.

It allows unauthenticated remote attackers to bypass the login screen entirely, granting them administrative “root” access to the server. With cPanel powering an estimated 2 million+ internet-facing instances, the “blast radius” includes millions of hosted websites, databases, and email accounts. +1


The Exploit: How the “watchTowr” PoC Works

Security researchers at watchTowr have released a technical deep dive and a functional Proof-of-Concept (PoC) exploit, significantly lowering the barrier for entry for threat actors.

The attack chain utilizes a Carriage Return Line Feed (CRLF) injection within the login flow. By manipulating the whostmgrsession cookie and the HTTP authorization headers, an attacker can:

  1. Inject raw \r\n characters into the session loading process.
  2. Force the server to write a session file to the disk containing arbitrary properties (e.g., user=root).
  3. Hijack the session token without ever providing a valid password.

The result? The attacker is granted full WHM access, allowing them to modify files, install malware, or pivot into private customer networks.


Active Exploitation: “Already in the Wild”

This is not a theoretical threat. Reports from hosting providers like Namecheap and KnownHost indicate that the vulnerability has been under active exploitation as a 0-day for at least 30 days.

Hosting giants have taken the unprecedented step of blocking ports 2083 and 2087 at the firewall level to protect customers while emergency patches are deployed.


Immediate Action Required: Patched Versions

cPanel accelerated its patch rollout on April 28, 2026. Administrators must ensure their systems are running one of the following fixed builds:

BranchPatched Version
Mainline/LTS11.86.0.41, 11.110.0.97, 11.118.0.63, 11.126.0.54
Current/Edge11.130.0.19, 11.132.0.29, 11.134.0.20, 11.136.0.5
WP Squared136.1.7

Export to Sheets

The “Force Update” Command:

Run the following as root to bypass any pinned version restrictions and pull the emergency fix: # /scripts/upcp --force


Emergency Mitigations (If You Can’t Patch)

If an immediate update is not possible—particularly on legacy or unsupported versions—you must implement these defenses now:

  • Firewall Lockdown: Block inbound traffic to ports 2083 (cPanel), 2087 (WHM), 2095, and 2096 except for trusted administrator IP addresses.
  • Service Suspension: Stop the cpsrvd and cpdavd services entirely to close the attack surface.
  • Audit for Backdoors: If you were running an unpatched version in the last 48 hours, audit your /var/cpanel/sessions/ directory and check for unauthorized root-level accounts.

Conclusion: The Management Plane is Vulnerable

CVE-2026-41940 is a “management-plane” disaster. When the tool used to secure the server is itself compromised, the entire ecosystem is at risk. Because this flaw allows for unauthenticated root access, any server currently visible to the public internet should be treated as a potential target.

Leave a Reply

Your email address will not be published. Required fields are marked *