Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

872+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-41940: WebPros cPanel & WHM and WP2 Missing Authentication Vulnerability
CVE-2026-41940: WebPros cPanel & WHM and WP2 Missing Authentication Vulnerability

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-41940

CVE-2026-41940: WebPros cPanel & WHM and WP2 Missing Authentication Vulnerability

WebPros cPanel, WHM, and WP2 (WordPress Squared) contain a critical authentication bypass in the login flow, allowing unauthenticated remote attackers to gain unauthorized access to the hosting control panel. Added to CISA KEV as actively exploited.

Dylan H.

Security Team

April 30, 2026
6 min read

Affected Products

  • WebPros cPanel & WHM (all versions prior to patched build)
  • WebPros WP2 (WordPress Squared) (all versions prior to patched build)

Executive Summary

A critical missing authentication vulnerability (CVE-2026-41940) has been identified in WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared), the industry-standard web hosting control panel software deployed across millions of shared hosting environments globally. The flaw exists in the login flow and allows unauthenticated remote attackers to bypass authentication entirely and gain unauthorized access to the control panel.

The vulnerability has been added to the CISA Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild. Hosting providers and server administrators running affected versions of cPanel, WHM, or WP2 must apply the emergency patch immediately.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-41940
SeverityCritical
CWECWE-306 — Missing Authentication for Critical Function
TypeAuthentication Bypass / Unauthorized Access
Attack VectorNetwork
Privileges RequiredNone (unauthenticated)
User InteractionNone
CISA KEVYes — actively exploited
Patch AvailableYes

Affected Products

ProductVendorStatus
cPanel & WHMWebProsVulnerable — patch available
WP2 (WordPress Squared)WebProsVulnerable — patch available

Technical Analysis

Root Cause

CVE-2026-41940 is classified as CWE-306: Missing Authentication for Critical Function. The vulnerability exists in the login flow of cPanel & WHM and WP2, where a critical function path fails to enforce proper authentication checks before granting access to the control panel interface.

An unauthenticated attacker can send a crafted request to the affected login endpoint, causing the application to bypass its own authentication logic and grant access without requiring valid credentials.

Attack Flow

1. Attacker identifies a target running vulnerable cPanel/WHM/WP2
2. Attacker crafts malicious HTTP request to the cPanel login endpoint
3. Authentication check is bypassed due to missing validation in the login flow
4. Attacker receives an authenticated session for the control panel
5. Full control panel access achieved — no credentials required
6. Attacker can access, modify, or destroy all hosted accounts on the server

Exploitation Conditions

  • Target must be running a vulnerable version of cPanel & WHM or WP2
  • No prior authentication, credentials, or account required
  • Network access to the cPanel/WHM port (typically TCP 2083, 2087) is sufficient
  • Exploitation is confirmed in-the-wild per CISA KEV designation

Impact Assessment

Impact AreaDescription
Full Control Panel AccessAttacker gains admin-level access to the hosting control panel
All Hosted Accounts at RiskEvery account on a shared server is exposed simultaneously
File System AccessRead, write, delete any file across hosted accounts
Database CompromiseAccess to all MySQL/MariaDB databases on the server
Email ExfiltrationAll hosted mailboxes and email data accessible
Backdoor InstallationAttacker can install webshells or modify site code
Lateral MovementCompromised server can be used to pivot into adjacent infrastructure
Credential TheftcPanel account passwords, FTP credentials, API keys all accessible

For managed hosting providers, a single vulnerable cPanel server exposes every customer account on that instance simultaneously, making this a catastrophic multi-tenant risk.


Immediate Remediation

Step 1: Apply the Emergency Update

# Update cPanel/WHM to the patched version via upcp
/usr/local/cpanel/scripts/upcp --force
 
# Verify the installed version
/usr/local/cpanel/cpanel -V
 
# For tier-based update channels, ensure automatic updates are enabled
whmapi1 set_tweaksetting key=cpanel_updates value=daily

Alternatively, update via the WHM interface: WHM > cPanel > Upgrade to Latest Version.

Step 2: Restrict Control Panel Access

# Restrict cPanel/WHM ports to trusted management IPs only
# Block external access to ports 2083 and 2087 at the firewall
iptables -I INPUT -p tcp --dport 2087 ! -s <trusted_mgmt_ip> -j DROP
iptables -I INPUT -p tcp --dport 2083 ! -s <trusted_mgmt_ip> -j DROP

Step 3: Audit for Compromise

# Review recent cPanel access logs for anomalous authentication events
grep -i "success" /usr/local/cpanel/logs/access_log | tail -500
 
# Check for unexpected file changes across all accounts
find /home/*/public_html -name "*.php" -newer /tmp/baseline_date -type f 2>/dev/null
 
# List recently created cPanel accounts
whmapi1 listaccts | grep -E "creation_date|user"
 
# Search for obfuscated PHP files (common webshell indicator)
grep -rn "base64_decode" /home/*/public_html/ 2>/dev/null | head -50

Step 4: Rotate All Credentials

# Force password changes for all cPanel accounts
for user in $(whmapi1 listaccts | grep user | awk -F: '{print $2}' | tr -d ' "'); do
  whmapi1 passwd user="$user" password="$(openssl rand -base64 24)" db_pass_update=1
done

Detection Indicators

IndicatorDescription
Unauthenticated requests to cPanel login endpointsExploitation attempt in web logs
New cPanel accounts created without corresponding billing eventsAttacker-created persistence
Unexpected PHP files in public_html directoriesWebshell installation
Outbound connections from web processes to unusual IPsPost-compromise C2 activity
Unusual file modifications across multiple hosted accounts simultaneouslyMass exploitation
Access log entries with no corresponding password authenticationExploitation artifact

Post-Remediation Checklist

  1. Patch immediately — Apply the cPanel/WHM emergency update via /usr/local/cpanel/scripts/upcp --force
  2. Verify patch — Confirm updated version number resolves CVE-2026-41940
  3. Restrict access — Firewall cPanel/WHM ports (2083, 2087) to trusted management IPs only
  4. Audit all accounts — Review for unauthorized accounts, file modifications, and webshells
  5. Rotate all credentials — Force password resets for all cPanel, WHM, FTP, and database accounts
  6. Invalidate API tokens — Regenerate all cPanel and WHM API tokens
  7. Enable 2FA — Enforce two-factor authentication on all control panel accounts
  8. Review access logs — Examine logs from at least late February 2026 onward for exploitation artifacts
  9. Notify customers — Inform hosted customers of the incident and any potential data exposure
  10. Monitor for re-exploitation — Set up alerts for anomalous control panel authentication events

References

  • CISA KEV — CVE-2026-41940
  • NVD — CVE-2026-41940
  • WebPros Security Advisories
#CVE-2026-41940#cPanel#WHM#WebPros#Authentication Bypass#CISA KEV#Web Hosting#WordPress

Related Articles

CVE-2026-4003: WordPress Users Manager PN Plugin Privilege Escalation (CVSS 9.8)

A critical privilege escalation vulnerability in the Users Manager – PN WordPress plugin (v1.1.15 and below) allows unauthenticated attackers to update...

5 min read

Critical Auth Bypass in Tutor LMS Pro Exposes 30,000+

The Tutor LMS Pro WordPress plugin's Social Login addon fails to verify OAuth token email matches the login request, allowing unauthenticated attackers to...

6 min read

CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability

ConnectWise ScreenConnect contains a path traversal vulnerability (CVE-2024-1708) that allows attackers to execute remote code or directly access confidential data on critical systems. CISA added it to the KEV catalog confirming active exploitation.

6 min read
Back to all Security Alerts