May 4, 2026
By esentry Team

cPanel Authentication Bypass Zero-Day

Severity: Critical

CVSS Score: 9.8 (Critical)

Status: Actively Exploited Zero-Day

Affected Platforms: cPanel & Web Host Manager (All supported versions prior to patched releases)

Overview

A critical authentication bypass zero-day vulnerability affecting cPanel and WebHost Manager (WHM) has been confirmed under active exploitation in the wild. The flaw enables unauthenticated remote attackers to bypass login controls and obtain administrative access to hosting servers without valid credentials.

Evidence indicates adversaries exploited the vulnerability before public disclosure and patch availability, significantly increasing exposure across hosting environments worldwide.

Because cPanel acts as the centralized management layer for websites, email infrastructure, databases, and user accounts, successful exploitation can lead to complete server compromise.

Technical Details

The vulnerability exists within multiple authentication paths used during login session handling. Improper validation allows attackers to circumvent authentication mechanisms entirely.

Affected versions include:

  • cPanel/WHM 11.110.0 → fixed in 11.110.0.97
  • cPanel/WHM 11.118.0 → fixed in 11.118.0.63
  • cPanel/WHM 11.126.0 → fixed in 11.126.0.54
  • cPanel/WHM 11.132.0 → fixed in 11.132.0.29
  • cPanel/WHM 11.134.0 → fixed in 11.134.0.20
  • cPanel/WHM 11.136.0 → fixed in 11.136.0.5
  • WP Squared 11.136.1 → fixed in 11.136.1.7

Why It Matters

cPanel manages nearly every operational component of hosted infrastructure. Once compromised, attackers may obtain:

  • WHM root-level server control
  • Access to all hosted websites
  • Email account takeover
  • Database access
  • Malware deployment capability
  • Persistence mechanisms
  • Use of servers for lateral attacks or botnet activity

This transforms a single exposed management interface into an organization-wide compromise point.

Indicators of Potential Compromise

Organizations should watch out for:

  • Unexpected WHM administrator sessions
  • New admin accounts created without approval
  • Unauthorized changes to hosting accounts
  • Unknown cron jobs or scheduled tasks
  • Suspicious outbound traffic from hosting servers
  • Modified authentication or session logs
  • Sudden website redirects or injected script

Attack Surface Exposure

High-risk environments include:

  • Public-facing hosting servers
  • Managed hosting providers
  • Shared hosting infrastructures
  • Organizations self-hosting email or web services via cPanel

Because exploitation requires no credentials, internet exposure alone is sufficient risk.

Recommendations

Organizations should treat this event as a control-plane security incident, not merely a software bug by carrying out the following:

  • Remove management panels from public internet exposure
  • Implement Zero Trust administrative access
  • Deploy attack surface management monitoring
  • Enforce centralized logging to SIEM
  • Conduct continuous external asset discovery
  • Segment hosting infrastructure from internal networks

Immediate remediation and proactive threat hunting is strongly advised.