In the world of web hosting, cPanel & WHM are the “keys to the kingdom.” They manage everything from SSL certificates and email accounts to root-level server configurations. On April 28, 2026, that kingdom faced a significant threat as cPanel issued an emergency security update to address a critical authentication bypass vulnerability. +1
This flaw strikes at the core of the platform’s authentication logic, potentially allowing unauthorized actors to skip login requirements and gain administrative access. Given that cPanel powers a massive portion of the global web hosting supply chain, the urgency for system administrators cannot be overstated.
The Vulnerability: Bypassing the Gatekeeper
While technical specifics are currently restricted to prevent widespread exploitation (“Security through Obscurity”), the advisory confirms that the flaw impacts multiple authentication paths within both cPanel (the user interface) and WHM (the administrative interface).
The Risk of Root Access
In a standard environment, WHM provides root-level access. A successful bypass at this level doesn’t just compromise a single website; it grants a threat actor the ability to:
- Exfiltrate Databases: Access sensitive customer data across all hosted accounts.
- Deploy Ransomware: Encrypt entire server volumes.
- Botnet Recruitment: Absorb high-bandwidth servers into malicious clusters for DDoS attacks.
- Email Interception: Read, redirect, or send fraudulent communications from any hosted domain.
Is Your Server Protected?
The cPanel security team has pushed patches across all supported release tiers. To ensure your environment is secure, verify that your server is running one of the following builds (or higher):
| Release Tier | Secure Build Version |
|---|---|
| Stable / Release | 11.136.0.5 |
| Current | 11.134.0.20 |
| Edge | 11.132.0.29 |
| LTS (Long Term Support) | 11.126.0.54 / 11.118.0.63 / 11.110.0.97 |
Export to Sheets
How to Apply the Emergency Patch
Most modern cPanel installations are configured for automatic updates. However, for a vulnerability of this severity, manual verification is mandatory.
Step 1: Force the Update via CLI
Login to your server via SSH as the root user and execute the following command to force an immediate update to the latest secure build:
Bash
/scripts/upcp --force
Step 2: Verify the Version
After the update completes, check your version number either in the top-right corner of the WHM interface or by running:
Bash
/usr/local/cpanel/cpanel -V
Step 3: Audit Authentication Logs
Check your logs for any unusual successful logins or “session hijacking” patterns that occurred prior to the patch. Look for unexpected IP addresses in:
/usr/local/cpanel/logs/login_log/usr/local/cpanel/logs/access_log
The Danger of Legacy Systems
A critical warning was issued for administrators running End-of-Life (EOL) versions of cPanel. These legacy iterations are highly likely to contain the same authentication flaw but will not receive an emergency patch.
If you are on an unsupported version, your only path to security is an immediate migration to a supported release track. In the interim, you should:
- Restrict Access: Use a firewall to whitelist only specific IP addresses for port 2087 (WHM) and 2083 (cPanel).
- Enforce MFA: Ensure Two-Factor Authentication (2FA) is mandatory for all accounts, though be aware that some bypasses can circumvent certain MFA implementations.
Conclusion: No Time for “Update Fatigue”
With the discovery of this flaw, the window for exploitation is rapidly closing as attackers reverse-engineer the patch. For hosting providers, this is a “drop everything” moment. Securing your administrative entry points is the only way to maintain the integrity of your customers’ data and your server’s reputation.