See what’s actually being exploited right now.

Discover Live Exploit Tracker

CVE-2026-41940: cPanel & WHM Authentication Bypass Puts Millions of Servers at Risk

One login flaw can hand over the keys to the hosting kingdom

The CrowdSec Network is tracking CVE-2026-41940, a critical authentication bypass in cPanel & WHM, the hosting control platform used to manage websites, email, databases, SSL certificates, and server settings at scale. CrowdSec telemetry places the first observed activity on April 27, 2026, cPanel issued a security update on April 28, the CVE was published on April 29, CISA added it to KEV on April 30, and CrowdSec released a dedicated detection rule the same day. Between April 27 and May 4, CrowdSec observed 282 distinct IPs associated with this CVE. Since April 30, a significant reconnaissance campaign has already been identified, aiming to inventory potential targets.

CrowdSec also published a WAF virtual patching rule on the 29th to help mitigate the risk for exposed setups

Key findings

  • This moved fast: CrowdSec first observed activity tied to CVE-2026-41940 on 27 April 2026; cPanel shipped a security update on 28 April; the CVE was published on 29 April; and both CISA KEV inclusion and CrowdSec detection coverage landed on 30 April.
  • There is already meaningful attacker attention: CrowdSec has seen 282 distinct IPs tied to this vulnerability between 27 April and 4 May. At the same time, the current exploitation phase remains Insufficient Data, which means the signal is real but still too early to classify with confidence.
  • The blast radius is unusually high: This is not a bug in a forgotten side tool. It affects the control plane that many hosting providers and web operations teams use to manage entire fleets of customer websites and server services.

What is cPanel & WHM?

cPanel & WHM is one of the most widely deployed web hosting management platforms on the internet. WHM is the administrative console used by hosting providers, MSPs, and server administrators to manage accounts, services, and server-wide settings. cPanel is the customer-facing interface for managing websites, mailboxes, domains, and databases.

Why it matters: When a vulnerability affects this layer, the risk extends far beyond a single web login. A successful compromise can give an attacker control over hosted websites, email accounts, DNS settings, SSL certificates, and backend databases. In business terms, this is less like someone sneaking into the lobby and more like someone quietly stealing the master key cabinet.

How does CVE-2026-41940 work?

According to technical analysis from WatchTowr Labs, CVE-2026-41940 is caused by a CRLF injection issue in how cpsrvd, the cPanel service daemon, handles pre-authentication session files during login. In plain English, the platform creates a session file before the user has actually proven who they are, and that file can be manipulated.

The attack flow is ugly but straightforward:

  • The attacker triggers a failed login to obtain a valid pre-authentication session
  • They resend the session cookie in a crafted form, so cPanel skips the usual protection applied to the password field
  • They inject extra lines through a malicious Basic Authorization header
  • Those injected lines are written into the session file as if they were legitimate session properties

That lets the attacker add values such as user=root, hasroot=1, and tfa_verified=1, effectively upgrading the session into an authenticated administrative session without valid credentials.

Original research: WatchTowr Labs technical write-up

Public exploit reference: WatchTowr proof-of-concept repository

Additional analysis: Rapid7 advisory

Threat Landscape Analysis

The current CrowdSec picture says two things at once. First, this vulnerability is clearly on attackers’ radar: the CVE now has public exploit code, a public Nuclei template, and CISA KEV status, and CrowdSec has already seen 282 IPs tied to the issue over a short observation window. Second, the telemetry is still too early and uneven to confidently label the campaign as broad opportunistic exploitation or more selective targeting.

Defenders should not mistake that uncertainty for safety. cPanel sits in a privileged position on internet-facing infrastructure, and attackers know it. A bug that grants administrative access to the hosting control plane is attractive even before it becomes noisy. Once reusable exploit content circulates more broadly, this kind of issue can go from specialist interest to internet-wide scanning very quickly.

How to protect your systems

Patch: Treat this as an emergency upgrade. Vendor guidance says supported cPanel & WHM versions require fixed builds released on April 28, 2026. Reported fixed versions include 11.86.0.41, 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.130.0.19, 11.132.0.29, 11.134.0.20, and 11.136.0.5. Use the official cPanel advisory for the correct target on your track: cPanel security update.

Preemptive blocking: If you cannot patch immediately, do not leave ports 2083 and 2087 openly exposed to the internet. Restrict access via a VPN, an identity-aware proxy, or a strict allowlist. Put a WAF in front of exposed login paths and monitor for suspicious session handling around whostmgrsession cookies and repeated requests to /login/?login_only=1. CrowdSec users should review the latest intelligence in CrowdSec CTI for CVE-2026-41940.

Deploy Virtual Patching Rules: If you cannot patch immediately, deploy CrowdSec’s WAF that includes Virtual Patching for CVE-2026-41940.
Stay proactive: Review recent administrative activity for unexpected account changes, new sessions, altered DNS or mail settings, modified websites, or unauthorized database access. If an exposed instance may have been reachable before patching, rotate privileged credentials and API tokens, and verify the integrity of hosted services managed by that server.

WRITTEN BY