CVE-2026-41940 cPanel/WHM CVSS 9.8 auth bypass — was a zero-day for 60 days before patching. Anyone seeing active exploitation evidence in their logs?
Posted by Expert_Sort7434@reddit | sysadmin | View on Reddit | 18 comments
Emergency patches dropped April 28 for cPanel & WHM. The flaw — CVE-2026-41940 — is a CRLF injection in the login flow that lets any unauthenticated remote attacker escalate to root with a crafted HTTP header. No exploit kit, no creds needed.
The scary part isn't the exploit itself — it's the timeline. Based on researcher findings, threat actors were exploiting this as a zero-day starting around February 2026, roughly two months before cPanel disclosed or patched it. Shodan puts \~1.5M cPanel instances internet-accessible right now.
Technical mechanics (short version):
Attacker triggers a failed login → gets session cookie → strips a hex value to bypass cPanel's input encryption → injects a CRLF-encoded root-privilege escalation header via the cookie → authenticated as root. That's the whole chain. Rapid7 and the Canadian Centre for Cyber Security both confirmed full host takeover as the impact — not just one site, but every tenant, every DB, every SSL key on that server.
Affected: All cPanel/WHM versions after 11.40, including WP Squared (their WordPress hosting product).
This is part of a pattern I've been tracking — management-plane tools (cPanel, WHM, firewall management consoles) are increasingly the primary targets because compromising the tool that manages everything gives you everything. I previously covered a similar attack vector with the FIRESTARTER Cisco Firepower Backdoor if you want more background:
https://www.techgines.com/post/firestarter-cisco-firepower-backdoor-cisa-warning-2026
To the sysadmins here: Have you found evidence of CVE-2026-41940 exploitation in your cPanel logs predating the April 28 disclosure? And realistically — how many of the 1.5M exposed instances do you think have already been backdoored during that 60-day window? What's your patching ETA looking like for multi-tenant environments?
https://www.techgines.com/post/cve-2026-41940-cpanel-authentication-bypass-zero-day
KoSoVaR@reddit
Surprised people are still using cPanel. It’s been at least 15 years since I’ve seen it.
DB-CooperOnTheBeach@reddit
My first sysadmin job was as a server support engineer for a managed hosting company. A ton of cPanel resellers rented baremetal servers and we had to manage all that cPanel junk. This was 20 years ago
TahinWorks@reddit
GoDaddy uses it for their hosting packages. Useful for consulting companies who spin up project-specific websites with only 3-5 year terms. I was actually impressed with GoDaddy (for once) - they blocked cPanel management ports as soon as it was announced and patched their entire customer base within 24 hours.
donith913@reddit
Yeah, talk about a throwback. I’m sort of nostalgic for the days when people hosted their own cheap websites, honestly.
KoSoVaR@reddit
I remember using geocities in the 90s!
InflateMyProstate@reddit
Same here! My first little side business in 2010 was hosting a few websites for folks via cPanel/WHM/WHMCS. Fun times.
mondersky@reddit
what do you use instead?
x3as@reddit
It's incredibly common in the SMB hosting space.
mullsies@reddit
Yep I have one. Home to some shitty long forgotten something. It is terrible.
Kuipyr@reddit
There are so many methods to wall off these admin panels nowadays. I’d almost consider it to be negligent to expose stuff like this to wide internet.
sysbitnet@reddit
We created a shell script last night, how help about this case, and put it on our GitHub. Anyone who reports a new IP address, we add it to the list
https://gist.github.com/sysbitnet/018ef5466be693a196ce063e820ed2bd
FluffyHippopotamuses@reddit
AI;DR
HumbleSpend8716@reddit
dogshit ai post
International_Ad2744@reddit
ok so i use WHM/CPanel.
But from what i cna see im on 110.0.97
Where is this 11.40 or is that literally version 11.40 eg (im way ahead of that)?
derfy2@reddit
You're actually on 11.110.0.97, so you're way ahead of 11.40.
ben-white27@reddit
The OP says any version AFTER 11.40,
G883@reddit
We got popped today, much fun
Kuipyr@reddit
There are so many methods to wall off these admin panels nowadays. I’d almost consider it to be negligent to expose stuff like this to wide internet.