Hackers are actively exploiting a bug in cPanel, used by millions of websites

Zack Whittaker

Read original article →

Concatena says

Our Take: If you’re using cPanel, make sure you’re patched!

This is a high-risk, actively exploited authentication-bypass in cPanel/WHM (CVE-2026-41940) that lets attackers skip login and take full admin control of servers; because cPanel is widespread and has deep server access, unpatched systems – especially on shared hosting – are prime targets and some hosts already saw exploitation attempts.

Your Takeaway: We’re not tech experts, but check with your team or provider and make sure you’re patched (or that access to control panels is blocked/isolated).

A serious bug in cPanel software lets hackers take full control of websites and servers. Many web hosting companies have fixed the issue, but users must update their systems quickly to stay safe. Experts warn that the vulnerability is being actively exploited and could affect millions of sites worldwide.

Highlights

cPanel and WHM are two software suites used for managing web servers that host websites, manage emails, and handle important configurations and databases needed to maintain an internet domain. The two suites have deep-access to the servers that they manage, allowing a malicious hacker potentially unrestricted access to data managed by the affected software.

The bug allows hackers to hijack and take full control of the servers running the affected software, which is thought to be used by tens of millions of website owners around the world.

Security researchers are sounding the alarm on a newly discovered vulnerability in the widely used web server management software cPanel and WebHost Manager (WHM).

Leave a Reply

Your email address will not be published. Required fields are marked *