cPanel Patches Three New Vulnerabilities Enabling Code Execution and DoS – Update Your Installations

The CyberSec Guru

cPanel & WHM Security Update

If you like this post, then please share it:

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Why your support matters: Zero paywalls: Keep the main content 100% free for learners worldwide, Writeup Access: Get complete in-depth writeup with scripts access within 12 hours of machine drop.

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

Ten days. That’s how long it took cPanel to issue a second emergency patch after the worst attack on its platform in recent memory. On May 8, the company pushed fixes for three newly disclosed vulnerabilities – CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203 covering its cPanel & WHM control panel and WP Squared (WP2) platform. Two of the three score 8.8 on the CVSS scale, putting them firmly in the High severity tier.

If you run cPanel on any server, you need to patch it now.

cPanel Logo
cPanel Logo

What Got Found, and Why It Matters

CVE-2026-29202 (CVSS 8.8) is the worst of the three. It’s an input validation failure in the plugin parameter of the create_user API call, and it lets an authenticated attacker inject and execute arbitrary Perl code on behalf of the system user tied to their account. In a shared hosting environment, that’s a serious problem — a low-privilege tenant account becomes a potential foothold into the underlying server.

CVE-2026-29203 (CVSS 8.8) involves how cPanel handles symbolic links during chmod operations. An attacker can craft a symlink pointing to a sensitive system file, trigger a permission change, and either break services outright or set up a privilege escalation chain. Both outcomes are bad. Used together with CVE-2026-29202, an attacker with a basic hosting account could plausibly work toward root.

CVE-2026-29201 (CVSS 4.3) is lower severity but still worth understanding. The feature::LOADFEATUREFILE adminbin call doesn’t adequately validate the file name parameter in which an attacker can pass a relative path, causing an arbitrary file on the server to be made world-readable. Private keys, credential files, config data – anything within reach becomes readable if an attacker knows what to ask for.

In shared hosting environments where multiple tenants run on the same server, CVE-2026-29202 and CVE-2026-29203 together create meaningful exposure to lateral movement and full server compromise.

The Bigger Picture: This Isn’t a Coincidence

CVE-2026-41940 – the auth bypass that preceded all of this was CVSS 9.8. It was rooted in CRLF injection that let unauthenticated attackers poison session files and bypass authentication entirely. Security researchers confirmed it had been actively exploited as a zero-day since at least February 2026, roughly two and a half months before a patch was available.

The compromise estimates exceeded 44,000 servers, with the “cPanelSniper” proof-of-concept driving mass exploitation. Mirai botnet variants used the flaw to recruit new DDoS nodes. Ransomware operators deployed “.sorry” extension payloads across affected hosting infrastructure. CISA added CVE-2026-41940 to its Known Exploited Vulnerabilities catalog and set a May 3 remediation deadline for federal agencies.

Finding CVE-2026-29201, 29202, and 29203 right after CVE-2026-41940 isn’t bad luck. It’s the result of cPanel auditing their codebase under pressure and finding more problems. That’s actually how this is supposed to work after a major incident. The concern is what else that audit might turn up. There may be further disclosures to come.

The broader issue is structural: a PHP and Perl codebase that manages system-level operations, network configuration, DNS, email, and web server settings from a single daemon creates a large, interconnected attack surface. Monolithic hosting panels built on decades-old foundations are showing the strain.

How to Patch

For most servers, this is one command run as root over SSH:

/scripts/upcp --force

After it completes, verify the installed version:

/usr/local/cpanel/cpanel -V

After patching, restart cpsrvd to make sure the daemon is running the updated code: /scripts/restartsrv_cpsrvd

For CentOS 6 / CloudLinux 6 systems, you need to pin to the right update branch first:

sed -i "s/CPANEL=.*/CPANEL=cl6110/g" /etc/cpupdate.conf
/scripts/upcp --force

CentOS 6 hit end-of-life in 2020. This patch covers it, but it’s a stopgap. Migration to AlmaLinux or Rocky Linux is the only real answer long-term.

Affected versions and their minimum patched builds:

PlatformMinimum Patched Version
cPanel & WHM11.136.0.9, 11.134.0.25, 11.132.0.31, 11.130.0.22, 11.126.0.58, 11.124.0.37, 11.118.0.66, 11.110.0.116/117, 11.102.0.41, 11.94.0.30, 11.86.0.43
WP Squared11.136.1.10
Legacy (CentOS 6)110.0.114

Common Questions

Are these being actively exploited? As of May 11, there are no confirmed cases in the wild. That will change if proof-of-concept code surfaces publicly and given how fast CVE-2026-41940 moved from disclosure to mass exploitation, that timeline can change fast.

What if I’m on managed hosting? Most managed providers (InMotion, KnownHost, HostGator, and others) push these patches automatically through their standard processes. Still worth a support ticket to confirm your server is actually running a patched build.

Can I block ports instead of patching? Restricting access to ports 2083 and 2087 reduces external exposure, but CVE-2026-29202 only requires an authenticated user, which in shared hosting means any customer on the box. Port blocking doesn’t help against that threat model.

What if I was already compromised? Audit access logs retroactively from February 23, 2026 – check /usr/local/cpanel/logs/access_log and /usr/local/cpanel/logs/login_log for unexpected session authentication patterns. Also run a recursive scan of user home directories for files with the .sorry extension. If you find them, you’re in incident response territory, not just patching territory. Rebuilding from a clean, verified off-site backup is the appropriate response at that point.

Two emergency patches in ten days is not a normal release cadence. Patch, verify, and keep watching the cPanel security mailing list.

Buy me A Coffee!

Support The CyberSec Guru’s Mission

🔐 Fuel the cybersecurity crusade by buying me a coffee! Your contribution powers free tutorials, hands-on labs, and security resources.

Why your support matters:
  • Writeup Access: Get complete writeup access within 12 hours
  • Zero paywalls: Keep the main content 100% free for learners worldwide

Perks for one-time supporters:
☕️ $5: Shoutout in Buy Me a Coffee
🛡️ $8: Fast-track Access to Live Webinars
💻 $10: Vote on future tutorial topics + exclusive AMA access

“Your coffee keeps the servers running and the knowledge flowing in our fight against cybercrime.”☕ Support My Work

Buy Me a Coffee Button

If you like this post, then please share it:

Discover more from The CyberSec Guru

Subscribe to get the latest posts sent to your email!

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from The CyberSec Guru

Subscribe now to keep reading and get access to the full archive.

Continue reading