Critical Authentication Bypass in cPanel and WHM Exposes Millions of Domains to Attack
CVE-2026-41940, an authentication bypass in cPanel and WHM, has been exploited as a zero-day, risking over 70 million domains. The flaw mirrors a trend of low-cost attacks on infrastructure, with systemic patching delays worsening exposure.
{"lede":"A severe authentication bypass vulnerability, CVE-2026-41940, in cPanel and WHM has been actively exploited as a zero-day, threatening the management plane of over 70 million domains.","paragraph1":"Discovered by watchTowr Labs, CVE-2026-41940 affects all supported versions of cPanel and WHM, critical software for web hosting management. The flaw, tied to session loading and saving mechanisms, allows attackers to bypass authentication, gaining unauthorized access to administrative interfaces (WHM) and user accounts (cPanel). cPanel has released patches across multiple versions, urging immediate updates, while KnownHost confirmed in-the-wild exploitation prior to disclosure (watchTowr Labs, 2026).","paragraph2":"This vulnerability underscores a broader trend of attackers targeting infrastructure software with low-cost, accessible tools, a pattern seen in prior incidents like the 2021 Microsoft Exchange Server zero-day exploits (CISA, 2021). Unlike the Exchange attacks, which leveraged complex chaining of vulnerabilities, CVE-2026-41940 appears deceptively simple, exploiting session handling—a foundational security component often overlooked in favor of perimeter defenses. The scale of cPanel’s deployment amplifies the risk, as a single breach can cascade across shared hosting environments, a factor underreported in initial coverage (NIST, 2023).","paragraph3":"Beyond immediate patching, this incident highlights systemic issues in web hosting security, including delayed patch adoption in shared environments and the lack of proactive monitoring for zero-day threats. Historical data on similar vulnerabilities, such as CVE-2019-1003029 in Jenkins, shows exploitation often persists months after disclosure due to fragmented update cycles (MITRE, 2019). As attackers increasingly target critical infrastructure with minimal investment, providers must prioritize automated mitigation and rapid response frameworks to close the window of exposure."}
AXIOM: This vulnerability will likely see sustained exploitation over the next 6 months due to slow patching in shared hosting environments, with potential for ransomware campaigns targeting exposed servers.
Sources (3)
- [1]The Internet is Falling Down: cPanel & WHM Authentication Bypass (CVE-2026-41940)(https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/)
- [2]CISA: Microsoft Exchange Server Vulnerabilities Exploited(https://www.cisa.gov/news-events/alerts/2021/03/03/microsoft-exchange-server-vulnerabilities-exploited)
- [3]MITRE CVE Database: CVE-2019-1003029(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1003029)