Hackers Are Actively Exploiting a Bug In cPanel, Used By Millions of Websites (techcrunch.com)
- Reference: 0183090668
- News link: https://it.slashdot.org/story/26/05/01/0631257/hackers-are-actively-exploiting-a-bug-in-cpanel-used-by-millions-of-websites
- Source link: https://techcrunch.com/2026/04/30/hackers-are-actively-exploiting-a-bug-in-cpanel-used-by-millions-of-websites/
> cPanel and WHM are two software suites used for managing web servers that host websites, manage emails, and handle important configurations and databases needed to maintain an internet domain. The two suites have deep-access to the servers that they manage, allowing a malicious hacker potentially unrestricted access to data managed by the affected software.
>
> Given the ubiquity of the cPanel and WHM software across the web hosting industry, hackers could compromise potentially large numbers of websites that haven't patched the bug. Canada's national cybersecurity agency said in [4]an advisory that the bug could be exploited to compromise websites on shared hosting servers, such as large web hosting companies.
>
> The agency said that "exploitation is highly probable" and that immediate action from cPanel customers, or their web hosts, is necessary to prevent malicious access. [...] One web hosting company says it found evidence that hackers have been abusing the vulnerability for months before the attempts were discovered.
[1] https://techcrunch.com/2026/04/30/hackers-are-actively-exploiting-a-bug-in-cpanel-used-by-millions-of-websites/
[2] https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
[3] https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026
[4] https://www.cyber.gc.ca/en/alerts-advisories/al26-008-vulnerability-affecting-cpanel-webhost-manager-whm-cve-2026-41940
Customers Update (Score:4, Insightful)
> cPanel is urging all customers and web hosts to update immediately.
For hosted websites, is this not something the web host should be doing for their customers?
Re: (Score:1)
Oh, sweet summer child.
Re: (Score:1)
I believe they meant in the general sense, not necessarily very-end-users.
Re: (Score:2)
> very-end-users.
Haven't heard that term before. I like it :)
Re: (Score:1)
Just don't take it too literally ;-)
Re: (Score:2)
"should" is doing some heavy lifting there.
But if you're concerned about a cPanel server where you have a site, you could just exploit the hole to gain admin access and then apply the update.
Re: (Score:3)
In my experience, it's something ONLY the host can do for the customers. We can't usually patch our own cpanel version on shared servers. You sometimes can't on rented servers unless you did the install yourself.
Chained to Copyfail (Score:3)
They get auth through CPanel then get root through Copyfail.
Brace for impact.
Re:Chained to Copyfail (Score:4, Funny)
CopyFail only affects kernels from 2017 on, nothing that new is running CPanel
Re: (Score:1)
cPanel is still in active use and development and runs on all modern operating systems.
Re: (Score:1)
Systems are dropping like flies, and this is only the beginning.
AI hasn’t even shown its true capabilities yet.
> Brace for impact.
Indeed.
So what? (Score:1)
cPanel has been under attack via different exploits for a long, long, looooooong time.
Just look at how long its CVE history is.
Namecheap Mitigations (Score:2)
[1]Namecheap actually shut off [kensai.app] access to my cpanel for a few hours, while they applied "mitigations". I hope it's enough.
[1] https://kensai.app/blog/security-briefing-2026-04-30-sap-cpanel-copy-fail
ah yep (Score:1)
cpanel on my site compromised a few months ago, host told everyone to go 2FA. I thought it was injection, to alter the notification email and intercept the passwords when reset but was in no doubt cpanel had a critical issue, not that you'd guess that was the case.