cPanel Patches Multiple Vulnerabilities Affecting WHM and WP Squared Servers


cPanel has patched multiple vulnerabilities across cPanel & WHM and WP Squared after a busy security update cycle that affected hosting environments, reseller systems, and servers running shared control panel infrastructure.

The latest fixes address several security issues, including arbitrary file reads, Perl code execution, unsafe symlink handling, SQL injection, privilege escalation, weak DNS cluster SSL enforcement, and an unauthenticated cpsrvd header-insertion flaw.

Administrators should update affected servers immediately, especially because cPanel also recently patched a separate critical authentication issue, CVE-2026-41940, that has already seen active exploitation.

cPanel’s May patches cover several vulnerability groups

The May 8 update fixed three vulnerabilities tracked as CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203. These issues affect different parts of cPanel & WHM and WP Squared.

CVE-2026-29201 involves insufficient validation in the feature::LOADFEATUREFILE adminbin call. cPanel said a relative path could cause an arbitrary file to become world-readable.

CVE-2026-29202 affects the create_user API call. The issue involves the plugin parameter and can allow arbitrary Perl code execution on behalf of the affected account’s system user.

CVEMain issuePotential impact
CVE-2026-29201Improper feature file-name validationArbitrary file read or exposure of sensitive files
CVE-2026-29202Perl code injection in create_user APICode execution as the affected account’s system user
CVE-2026-29203Unsafe symlink handling in cPanel NovaDenial of service or possible local privilege escalation

The May 8 flaws matter for shared hosting

The biggest concern is not only individual impact, but the environment where cPanel usually runs. Shared hosting servers often have many accounts on the same system, which makes isolation especially important.

CVE-2026-29203 shows that risk clearly. The flaw allows a user-controlled symlink under a legacy Nova path to influence chmod behavior, potentially changing permissions on arbitrary system files or directories.

That can create denial-of-service conditions and may support local privilege escalation in the right environment. Hosting providers should treat these bugs as high-priority even when exploitation requires some access to the system.

cPanel also patched five more flaws on May 13

A second May patch wave covered five additional vulnerabilities: CVE-2026-29205, CVE-2026-29206, CVE-2026-32991, CVE-2026-32992, and CVE-2026-32993.

The most notable of these is CVE-2026-29205. cPanel said a combination of incorrect privilege dropping and insufficient path filtering made it possible to read arbitrary files through certain cpdavd endpoints. This affects cPanel & WHM versions 120 and higher.

cPanel later released an additional fix for CVE-2026-29205 and recommended that administrators update again and confirm that their systems are on the newer patched builds.

CVEAffected areaIssue
CVE-2026-29205cpdavd endpointsArbitrary file read through incorrect privilege dropping and insufficient path filtering
CVE-2026-29206sqloptimizer scriptSQL query injection risk
CVE-2026-32991Team users and UAPI modulesLow-privilege team user escalation to owner account capabilities
CVE-2026-32992DNS Cluster systemSSL verification weakness that could expose credentials to interception
CVE-2026-32993cpsrvd endpointUnauthenticated arbitrary HTTP header insertion

CVE-2026-41940 remains the critical exploited issue

The critical 9.8 vulnerability tied to cPanel’s recent security activity is CVE-2026-41940. It is separate from the May 8 and May 13 patch sets.

cPanel described CVE-2026-41940 as an authentication vulnerability in the session management layer. A specially crafted request could cause an unauthenticated session to be treated as authenticated.

CISA added CVE-2026-41940 to its Known Exploited Vulnerabilities catalog on May 1, 2026. cPanel said the flaw affects every cPanel & WHM version after v11.40 and WP Squared up to v11.136.1.6.

Why hosting providers should move quickly

cPanel servers often manage websites, email, DNS, databases, files, accounts, and reseller functions from one control plane. A flaw in that control plane can affect many customers on the same server.

File-read bugs can expose configuration files, account data, credentials, tokens, or private operational details. Code execution and privilege escalation flaws can increase the damage if attackers already have user-level access.

The risk grows when servers run outdated release tiers, lack automatic updates, or host untrusted users. Shared hosting providers should check patch status across every server, not only internet-facing control panel nodes.

  • Update cPanel & WHM to the fixed build for the active release tier.
  • Update WP Squared if it runs on the server.
  • Run the update manually if automatic updates are disabled.
  • Verify the installed version after updating.
  • Review logs for suspicious API calls, file reads, and account changes.
  • Restrict access to cPanel, WHM, Webmail, WebDAV, and related service ports where possible.
  • Apply cPanel’s mitigation guidance for systems that cannot update immediately.

Patched versions administrators should check

For the May 8 vulnerabilities, cPanel listed patched builds across supported branches, including 11.136.0.9 and higher, 11.134.0.25 and higher, 11.132.0.31 and higher, and several older supported tiers.

For the May 13 CVE-2026-29205 update, cPanel later recommended newer patched builds, including 11.124.0.40 and higher, 11.126.0.61 and higher, 11.130.0.25 and higher, 11.132.0.34 and higher, 11.134.0.28 and higher, and 11.136.0.12 and higher.

Administrators should not rely only on version assumptions. They should verify the installed build after patching because cPanel released follow-up fixes for at least one issue.

  1. Log in to the server through SSH as root.
  2. Run /scripts/upcp –force to apply the latest update.
  3. Run /usr/local/cpanel/cpanel -V to confirm the installed build.
  4. Compare the result with cPanel’s fixed version list for the active release tier.
  5. Repeat this check across all servers, including reseller and staging systems.

The recent cPanel updates arrived during a wider wave of Linux hosting security concerns. cPanel also published guidance for Dirty Frag, a Linux kernel local privilege escalation issue affecting multiple Linux distributions.

Dirty Frag is not a cPanel vulnerability, but it matters because cPanel servers run on Linux and often host many local users. Kernel privilege escalation bugs can turn lower-level access into root access if the underlying operating system remains unpatched.

cPanel has also addressed Exim updates tied to CVE-2026-40684, CVE-2026-40685, CVE-2026-40686, and CVE-2026-40687. Mail services are a major part of hosting environments, so administrators should confirm that both cPanel and bundled service packages are current.

What admins should monitor after patching

Patching closes the known flaws, but administrators should still check for suspicious activity. That matters more for systems that were exposed before updates became available or that delayed patch deployment.

Teams should review cPanel API activity, account creation events, feature file access, WebDAV logs, DNS cluster changes, team-user privilege changes, and unexplained permission changes under user-controlled directories.

For CVE-2026-41940 exposure, administrators should follow cPanel’s detection guidance and review session-file indicators. If compromise appears likely, they should rotate credentials, review account-level access, and inspect web roots for malware or unauthorized files.

Area to inspectReason
cPanel API logsMay reveal suspicious create_user activity or unexpected automation.
cpdavd logsMay reveal attempts to access files through WebDAV-related endpoints.
Team-user settingsMay show privilege changes linked to owner account escalation risks.
DNS cluster settingsMay reveal changes affecting trust or credential exposure.
File permissionsMay show chmod-related changes that should not exist.
Session filesMay help investigate CVE-2026-41940 exploitation indicators.

Shared hosting security depends on fast updates

The recent cPanel patch cycle shows why hosting providers need a strict update process. A single vulnerable control panel can expose many accounts, domains, mailboxes, databases, and customer workloads.

Servers that support untrusted users need extra attention because several flaws affect account boundaries, file access, or local privilege paths. Even bugs that look limited can become serious when combined with other hosting-layer weaknesses.

The safest path is to update cPanel & WHM, WP Squared, Exim, Apache, and the underlying Linux kernel as soon as tested patches become available. Administrators should also limit management access to trusted networks and audit server activity after every emergency security release.

FAQ

What cPanel vulnerabilities were patched in May 2026?

cPanel patched several vulnerabilities in May 2026, including CVE-2026-29201, CVE-2026-29202, CVE-2026-29203, CVE-2026-29205, CVE-2026-29206, CVE-2026-32991, CVE-2026-32992, and CVE-2026-32993. These issues affect file access, code execution, symlink handling, SQL queries, team-user privileges, DNS cluster SSL enforcement, and cpsrvd headers.

Is CVE-2026-41940 part of the same cPanel patch set?

No. CVE-2026-41940 is a separate critical cPanel session-management vulnerability patched on April 28, 2026. It carries a 9.8 CVSS score and has been added to CISA’s Known Exploited Vulnerabilities catalog.

Which cPanel flaw allows arbitrary file reads?

More than one recent cPanel issue involved file-read risk. CVE-2026-29201 affects the feature::LOADFEATUREFILE adminbin call, while CVE-2026-29205 affects certain cpdavd endpoints through incorrect privilege dropping and insufficient path filtering.

How can administrators patch the cPanel vulnerabilities?

Administrators should run /scripts/upcp –force, then verify the installed cPanel version with /usr/local/cpanel/cpanel -V. They should compare the result with cPanel’s fixed version list for their release tier and update WP Squared where applicable.

What should admins check after applying the cPanel updates?

Admins should review cPanel API logs, cpdavd activity, team-user changes, DNS cluster settings, file-permission changes, session-file indicators, and unusual account activity. They should also rotate credentials if they suspect compromise.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages