Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Home/CyberSecurity News/cPanel Emergency Patch Fixes Critical Auth Flaw Warns Authentication
CyberSecurity News

cPanel Emergency Patch Fixes Critical Auth Flaw Warns Authentication

cPanel, the dominant web hosting control panel provider, has released an emergency security update to fix a critical vulnerability within its core software. The security flaw directly impacts...

Sarah simpson
Sarah simpson
April 29, 2026 2 Min Read
0 0

cPanel, the dominant web hosting control panel provider, has released an emergency security update to fix a critical vulnerability within its core software.

The security flaw directly impacts multiple authentication paths within the cPanel and Web Host Manager (WHM) ecosystem.

System administrators and web hosting providers are strongly urged to apply the patch immediately to secure their environments against potential unauthorized access.

The development team confirmed the security issue on April 28, 2026, noting that it affects all currently supported versions of the platform.

While specific technical details of exploitation methods remain restricted to protect users, vulnerabilities in authentication paths have historically been severe.

If exploited, an attacker could potentially bypass login mechanisms to gain administrative control over the server.

Attack Surface and Potential Impact

Because cPanel and WHM are universally used to manage web hosting infrastructure, the attack surface is vast.

WHM provides root-level access to the server, allowing administrators to configure security protocols, manage SSL certificates, and create individual hosting accounts.

A compromised authentication path at this level grants threat actors complete control over all hosted websites, sensitive databases, and email communications.

Such access frequently leads to severe security incidents, including mass website defacement, ransomware deployment, and the exfiltration of confidential customer data.

Furthermore, compromised servers are often absorbed into botnets to launch distributed denial-of-service attacks or distribute malicious spam campaigns.

Securing these administrative entry points is critical to maintaining the integrity of the broader web hosting supply chain.

To neutralize this threat, the cPanel security team has pushed out emergency patches across all supported release tiers.

Administrators must verify that their servers are running one of the following secure builds:

Released versions: 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5.

Server operators can manually enforce the update process using the command-line interface.

Executing the /scripts/upcp --force command will instruct the server to fetch and install the latest patched release directly from the official repositories.

Administrators should also monitor their authentication logs for any unusual login attempts that may have occurred before patching.

Warnings for Unsupported Systems

The security advisory includes a critical warning for environments running end-of-life or unsupported iterations of the software.

Older versions are highly likely to contain the same authentication flaw but will not receive this emergency fix.

Administrators managing legacy servers must plan a migration to a supported release track as soon as possible.

In the interim, deploying strict firewall rules, enforcing multi-factor authentication, and utilizing IP allowlisting for WHM access can help mitigate the immediate risk of exploitation.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitPatchransomwareSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Critical GitHub RCE Vulnerability Allows Server Compromise

Next Post

BlueNoroff Campaign Uses Fileless PowerShell & AI-Generated Zoom

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
China-Aligned Attackers Use ShadowPad, IOX Proxy WMIC Multi-Stage
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us