Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
GnuTLS 3.8.13 Released with Fix for 12 Vulnerabilities Affecting
May 5, 2026
Critical Qualcomm Chipset Flaws Enable Remote Code Execution
May 5, 2026
Critical Weaver E-cology RCE Actively Exploited Vulnerability Attacks
May 5, 2026
Home/CyberSecurity News/CISA Warns: cPanel & WHM Vulner Vulnerability Exploited
CyberSecurity News

CISA Warns: cPanel & WHM Vulner Vulnerability Exploited

An urgent warning from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlights a critical security flaw impacting widely used web hosting management platforms. CISA recently added...

Jennifer sherman
Jennifer sherman
May 4, 2026 2 Min Read
0 0

An urgent warning from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) highlights a critical security flaw impacting widely used web hosting management platforms.

CISA recently added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, indicating that threat actors are actively abusing it in real-world attacks.

Tracked as CVE-2026-41940, the defect targets WebPros cPanel & WHM (WebHost Manager) as well as WP2 (WordPress Squared).

Understanding the Authentication Bypass Flaw

CVE-2026-41940 is officially classified as a “Missing Authentication for Critical Function” vulnerability, mapped to the weakness identifier CWE-306.

The security gap exists directly within the login flow of the affected products.

Because the software fails to properly verify user identities during the authentication process, unauthenticated remote attackers can bypass security checks completely.

This means a cybercriminal does not need valid usernames or passwords to break in.

Instead, they can exploit the login mechanism to instantly gain unauthorized administrative access to the hosting control panel.

WebPros cPanel & WHM is a popular suite that simplifies website and server management, while WP2 provides streamlined WordPress operations.

Control panels are highly attractive targets for attackers because they serve as the administrative backbone for thousands of websites, databases, and server configurations.

The widespread adoption of these tools means a single flaw can expose countless domains to immediate compromise.

Once an attacker bypasses the login screen, they effectively hold the keys to the kingdom.

They can modify website files, steal sensitive database information, reroute web traffic, or establish persistent backdoors for future access.

While CISA notes that it is currently unknown if this specific vulnerability is tied to ongoing ransomware campaigns, the risk remains severe.

Compromised hosting environments are frequently weaponized to host phishing pages, run cryptomining scripts, or launch coordinated attacks against other networks.

Required Mitigations and Deadlines

To counter this active threat, CISA mandates immediate action from federal agencies, and private organizations are strongly encouraged to adopt the same protective measures.

Security teams and system administrators should prioritize the following steps:

  • Apply the latest security patches provided by the vendor immediately to secure the login flow.
  • Follow the security guidance outlined in CISA’s Binding Operational Directive (BOD) 22-01 specifically regarding cloud services.
  • Discontinue the use of the vulnerable product entirely if updates or practical mitigations are unavailable for your specific environment.

CISA originally added this vulnerability to the KEV catalog on April 30, 2026, and set a strict remediation deadline of May 3, 2026.

Because this deadline has already passed, organizations that have not yet patched their systems must treat this as a critical incident response priority.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitPatchphishingransomwareSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Threat Actors Automate 0-Day Exploits with AI Discovery Exploitation

Next Post

Critical MOVEit Vulnerabilities Enable Authentication Bypass

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
ScarCruft Supply Chain Attack Hits Gaming with Platform Windows
May 5, 2026
Silver Fox Deploys ValleyRAT & ABCDoor Via Fake Uses Notices
May 5, 2026
Cerberus Stalkerware Abuses Google Play for Leverages Accessibility
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us