Breaking
Live threat feed May 19, 2026 | 12:24 UTC
4110 CVEs This Month
6 Actively Exploited
2 Ransomware Activity
18 Breaches YTD
Threat Investigation Portal
Investigate an IOC in the live graph workspace.
Investigate IOC
Vulnerabilities

Critical Authentication Bypass Vulnerability CVE-2026-41940 Exploited in cPanel, WHM, and WP Squared

Critical Authentication Bypass Vulnerability CVE-2026-41940 Exploited in cPanel, WHM, and WP Squared

The critical CVE-2026-41940 authentication bypass vulnerability affecting cPanel, WHM, and WP Squared is actively exploited in the wild, with exploit attempts documented since late February. A proof-of-concept exploit has recently been published, increasing the urgency for mitigation.

What happened

A critical authentication bypass vulnerability identified as CVE-2026-41940 has been discovered in cPanel, WHM, and WP Squared, popular server and web management software solutions. This vulnerability has been exploited in real-world attacks since late February 2026. Recently, a proof-of-concept (PoC) exploit demonstrating the vulnerability was publicly released, providing attackers with ready-made methods to abuse it.

The vulnerability enables attackers to bypass authentication mechanisms, potentially granting unauthorized access to vulnerable systems. This ongoing exploitation highlights the risk posed by unpatched installations of these platforms and emphasizes the need for swift response by administrators.

Why it matters

Given the widespread use of cPanel, WHM, and WP Squared in managing web hosting and server operations, the exploitation of CVE-2026-41940 poses a significant security threat. Attackers who successfully leverage this authentication bypass can gain unauthorized access, leading to potential data breaches or system compromise.

The disclosure of a publicly available proof-of-concept increases the likelihood of broader exploitation attempts by less skilled attackers, underscoring the critical importance of addressing this vulnerability promptly to mitigate risk.

What security teams should do

Security teams managing cPanel, WHM, or WP Squared deployments should immediately review vendor guidance and apply any available patches or mitigations to address CVE-2026-41940. Monitoring for suspicious authentication activity and unauthorized access attempts is also recommended to detect potential exploitation.

Administrators are advised to verify system logs and ensure that access controls remain robust, as the authentication bypass could allow attackers to circumvent normal security mechanisms. If no patches are available yet, consider applying temporary compensating controls as recommended by product vendors.

Key technical details

CVE-2026-41940 is classified as a critical authentication bypass vulnerability, which allows attackers to circumvent the authentication processes in cPanel, WHM, and WP Squared. The exact technical mechanisms enabling the bypass are detailed in the recently published proof-of-concept exploit code.

The vulnerability has been exploited in the wild since late February 2026, indicating active threat actor interest. The release of PoC code facilitates easier reproduction of the exploit, potentially lowering the barrier for exploitation attempts against unpatched instances.

Affected organizations/products

The vulnerability affects cPanel, WHM, and WP Squared software platforms used for server and web hosting management. No additional affected products or organizations have been specified.

Source attribution

https://www.bleepingcomputer.com/news/security/critical-cpanel-and-whm-bug-exploited-as-a-zero-day-poc-now-available/

Thirumala Rao Padilam
Written by
Thirumala Rao Padilam
error: Content is protected !!