CVE-2026-41940 is a CVSS 9.8 authentication bypass in cPanel and WHM that attackers exploited in the wild for at least 30 days before an emergency patch was released on April 28, 2026. The root cause is a CRLF injection flaw in cPanel’s session-handling code. All supported version branches are affected. KnownHost confirmed “successful exploits were seen in the wild” and placed the exploitation window at a minimum of 30 days before disclosure — meaning servers were actively compromised while administrators were unaware any vulnerability existed.
CVE-2026-41940: What We Know So Far
The flaw is a CRLF injection bug in cPanel and WHM’s session handling layer. An unauthenticated remote attacker can inject carriage return and line feed characters into HTTP requests to manipulate session state and bypass the authentication check entirely, gaining full access to the cPanel or WHM interface without credentials.
CVSS base score: 9.8 (Critical). The attack is network-accessible, requires no authentication, and needs no user interaction — maximum attack complexity rating.
All currently supported cPanel version branches were vulnerable. Emergency patches were released April 28, 2026, across six branches:
- 11.136.0.5
- 11.134.0.20
- 11.132.0.29
- 11.126.0.54
- 11.118.0.63
- 11.110.0.97
WatchTowr Labs published a technical breakdown confirming the CRLF injection root cause and noting the exploit path was straightforward once the injection point was identified. The patch addresses the session-handling parser to reject malformed CRLF sequences before session state is evaluated.
SecurityWeek’s reporting adds the critical timeline detail: exploitation was not discovered the day of the patch. The 30-day pre-patch window confirmed by KnownHost means a significant proportion of the 70+ million domains on cPanel-managed servers were exposed to active attackers before any defensive action was possible.
Why CVE-2026-41940 Matters
An authentication bypass at the cPanel or WHM level is a complete host compromise. The attacker gains everything the control panel exposes:
- Full file system read and write access for all hosted accounts
- DNS zone control for every domain on the server
- SSL certificate issuance and revocation
- Database administration (MySQL/MariaDB) for all hosted sites
- Email account access, forwarding rules, and relay configuration
- Ability to create new privileged accounts
With 70 million or more domains dependent on cPanel infrastructure, the aggregate blast radius of CVE-2026-41940 is among the largest authentication bypass vulnerabilities disclosed in 2026.
The confirmed pre-patch exploitation window is the operationally significant detail. It means the working assumption for any organization running internet-facing cPanel prior to April 28 must be potential compromise, not merely theoretical risk. Defenders cannot treat this as a “patch and move on” event without first ruling out unauthorized access during the exposure window.
CVE-2026-41940: What You Should Do Now
- Verify your cPanel version immediately. Run
cat /usr/local/cpanel/versionfrom the command line, or log in to WHM and check Server Information. You must be on a patched build: 11.136.0.5, 11.134.0.20, 11.132.0.29, 11.126.0.54, 11.118.0.63, or 11.110.0.97. - Apply the emergency patch if not already done. Run
/scripts/upcp --forceto update to the latest patched build for your branch. - Review authentication logs for the 30-day pre-patch window. Search
/usr/local/cpanel/logs/login_logfor successful logins to cPanel (port 2083) or WHM (port 2087) from unexpected source IPs from late March through April 28, 2026. - Audit active accounts and SSH authorized keys. Use
whmapi1 listacctsto enumerate accounts and cross-check against your known account list. Review~/.ssh/authorized_keysfor all system users, particularly root. - Rotate all credentials. Reset passwords for all cPanel accounts, WHM root, and associated database users. Assume any credential accessible through the control panel interface is compromised.
Detection and Verification Checklist
- Patch status:
cat /usr/local/cpanel/versionmust return a patched build number in each branch. - Scan
/usr/local/cpanel/logs/login_logfor HTTP 200 responses to/login/endpoints from external IPs not in your administrator allowlist between late March and April 28. - Check
/var/log/chkservd.logfor service restarts and/var/log/messagesfor unexpected user creation events. - Run
whmapi1 list_usersand compare against your authorized account baseline. - Inspect cron jobs (
crontab -lfor each account;/etc/cron*) for entries created after late March. - Verify DNS zone integrity:
whmapi1 listzonesand confirm no unauthorized records were added. - If unauthorized access is confirmed, a full server rebuild is advisable rather than attempting to clean a potentially backdoored host.
Sources: SecurityWeek, WatchTowr Labs, webhosting.today / KnownHost, Cyber Kendra
For any query contact us at contact@cipherssecurity.com

