cPanel: Know if you’re exposed. Act before threat actors do.

A critical cPanel and WHM authentication bypass vulnerability, CVE-2026-41940, is being actively exploited. If you run cPanel, WHM, WP Squared, or host customer websites, you need to verify your exposure, patch status, and signs of compromise now.

Unsure whether your cPanel or WHM servers are exposed or already compromised? Eye Security can help with:

  • cPanel/WHM exposure review
  • confirming patch status
  • reviewing IOCs and signs of compromise
  • assessing persistence or backdoor risk
  • temporary EDR/MDR monitoring options
cPanel CVE-2026-41940: Check exposure, patch status, and compromise risk

cPanel: Know if you’re exposed. Act before threat actors do.

A critical cPanel and WHM authentication bypass vulnerability, CVE-2026-41940, is being actively exploited. If you run cPanel, WHM, WP Squared, or host customer websites, you need to verify your exposure, patch status, and signs of compromise now.

Unsure whether your cPanel or WHM servers are exposed or already compromised? Eye Security can help with:

  • cPanel/WHM exposure review

  • confirming patch status

  • reviewing IOCs and signs of compromise

  • assessing persistence or backdoor risk

  • temporary EDR/MDR monitoring options

cPanel vulnerability

cPanel CVE-2026-41940: Know if you’re exposed. Act before threat actors do.

A critical cPanel and WHM authentication bypass vulnerability, CVE-2026-41940, is being actively exploited. If you run cPanel, WHM, WP Squared, or host customer websites, you need to verify your exposure, patch status, and signs of compromise now.

Unsure whether your cPanel or WHM servers are exposed or already compromised? Eye Security can help with a cPanel/WHM exposure review, confirming patch status, reviewing IOCs and signs of compromise, assessing persistence or backdoor risk, and temporary EDR/MDR monitoring options.

 

cPanel vulnerability

NCSC-NL advises organisations to install the available updates as soon as possible.

Contact your IT provider if you are unsure whether you are using a vulnerable version

If you run cPanel or WHM, take these steps.

What happened and how Eye Security can help now.

cPanel vulnerability

A critical cPanel vulnerability is under active exploitation

CVE-2026-41940 affects cPanel and WHM versions after 11.40 and before patched releases. The vulnerability can allow unauthenticated remote attackers to bypass authentication and gain unauthorised access to the WHM control panel with root privileges.

For hosting providers, MSPs, and organisations managing multiple websites, the impact can be significant. A compromised cPanel/WHM server can expose hosted websites, databases, credentials, and customer environments.

At least 44,000 IP addresses are likely compromised and involved in scanning and brute-force activity around April 30, according to Shadowserver data.

cPanel vulnerability
A critical cPanel vulnerability is under active exploitation

CVE-2026-41940 affects cPanel and WHM versions after 11.40 and before patched releases. The vulnerability can allow unauthenticated remote attackers to bypass authentication and gain unauthorised access to the WHM control panel with root privileges.

For hosting providers, MSPs, and organisations managing multiple websites, the impact can be significant. A compromised cPanel/WHM server can expose hosted websites, databases, credentials, and customer environments.

At least 44,000 IP addresses are likely compromised and involved in scanning and brute-force activity around April 30, according to Shadowserver data.

Business email compromise is the new threat to the German mid-market

One vulnerable control panel can become many customer problems

cPanel is widely used by hosting providers, MSPs, and IT service providers to manage websites and server environments at scale. When threat actors gain privileged access, they can:

  • access or alter hosted websites
  • steal credentials or configuration data
  • plant backdoors for later use
  • move across hosted environments
  • hide traces of compromise
  • return after patching if persistence remains

Patching may not be enough if exploitation happened before the update was applied.

Business email compromise is the new threat to the German mid-market
One vulnerable control panel can become many customer problems

cPanel is widely used by hosting providers, MSPs, and IT service providers to manage websites and server environments at scale. When threat actors gain privileged access, they can:

  • access or alter hosted websites
  • steal credentials or configuration data
  • plant backdoors for later use
  • move across hosted environments
  • hide traces of compromise
  • return after patching if persistence remains

Patching may not be enough if exploitation happened before the update was applied.

cPanel exposure review

Eye Security moved overnight to protect European customers

When the cPanel unauthenticated RCE risk emerged, Eye Security’s research and SOC teams moved fast.

Within hours, we:

  • analysed the vulnerability
  • reproduced the authentication bypass and root-level access path
  • scanned across our customer base
  • identified cPanel instances across dozens of customers
  • verified whether environments were patched, mitigated, or still at risk
  • began sharing indicators and scripts with the wider security community

Most identified customer environments were already safe, patched, or mitigated. But for organisations that are unsure of their cPanel status, the risk remains real.

cPanel exposure review
Eye Security moved overnight to protect European customers

When the cPanel unauthenticated RCE risk emerged, Eye Security’s research and SOC teams moved fast.

Within hours, we:

  • analysed the vulnerability
  • reproduced the authentication bypass and root-level access path
  • scanned across our customer base
  • identified cPanel instances across dozens of customers
  • verified whether environments were patched, mitigated, or still at risk
  • began sharing indicators and scripts with the wider security community

Most identified customer environments were already safe, patched, or mitigated. But for organisations that are unsure of their cPanel status, the risk remains real.

 

Urgent cPanel exposure support for European organisations

Eye Security can help MSPs, web hosters, and organisations running cPanel understand whether they are exposed and what to do next.

Where we support:

  • cPanel/WHM exposure review
  • detection of potentially affected assets
  • guidance on patching and mitigation
  • IOC-based checks
  • EDR/MDR monitoring for suspicious post-compromise activity
  • incident response support if compromise is suspected
  • support for MSPs managing multiple customer environments

For MSPs and hosting providers, we can also discuss temporary monitoring options for cPanel servers where compromise cannot be confidently ruled out.

cPanel CVE-2026-41940: Check exposure, patch status, and compromise risk