CVE-2026-41940
Vulnerability Summary
Timeline
Description
cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
CVSS Metrics
- v4.0•CRITICAL•Score: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
- v4.0•CRITICAL•Score: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- v3.1•CRITICAL•Score: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Trends
Current EPSS score: 16.52%• Percentile: 95%
Techniques & Countermeasures
- CWE-306•Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Affected Systems
- cpanel, l.l.c.•cpanel & whm
≥ 11.110.0, < 11.110.0.97 | ≥ 11.118.0, < 11.118.0.63 | ≥ 11.126.0, < 11.126.0.54 | ≥ 11.132.0, < 11.132.0.29 | ≥ 11.134.0, < 11.134.0.20 | ≥ 11.136.0, < 11.136.0.5
- cpanel, l.l.c.•wp squared
≥ 11.136.1, < 11.136.1.7
- cpanel•cpanel
≥ 11.110.0, < 11.110.0.97 | ≥ 11.118.0, < 11.118.0.63 | ≥ 11.126.0, < 11.126.0.54 | ≥ 11.132.0, < 11.132.0.29 | ≥ 11.134.0, < 11.134.0.20 | ≥ 11.136.0, < 11.136.0.5 | ≥ 11.86.0, < 11.86.0.41 | ≥ 11.130.0, < 11.130.0.18 | ≥ 11.40, < 86.0.41 | ≥ 88.0.0, < 110.0.97 | ≥ 112.0.0, < 118.0.63 | ≥ 120.0.0, < 126.0.54 | ≥ 128.0.0, < 130.0.19 | ≥ 132.0.0, < 132.0.29 | ≥ 134.0.0, < 134.0.20 | ≥ 136.0.0, < 136.0.5
- cpanel•whm
≥ 11.110.0, < 11.110.0.97 | ≥ 11.118.0, < 11.118.0.63 | ≥ 11.126.0, < 11.126.0.54 | ≥ 11.132.0, < 11.132.0.29 | ≥ 11.134.0, < 11.134.0.20 | ≥ 11.136.0, < 11.136.0.5 | ≥ 11.86.0, < 11.86.0.41 | ≥ 11.130.0, < 11.130.0.18 | ≥ 11.40, < 86.0.41 | ≥ 88.0.0, < 110.0.97 | ≥ 112.0.0, < 118.0.63 | ≥ 120.0.0, < 126.0.54 | ≥ 128.0.0, < 130.0.19 | ≥ 132.0.0, < 132.0.29 | ≥ 134.0.0, < 134.0.20 | ≥ 136.0.0, < 136.0.5
- cpanel•wp_squared
≥ 11.136.1, < 11.136.1.7 | < 136.1.7
- webpros•cpanel
≥ 11.40.0.0, < 11.86.0.41 | ≥ 11.88.0.0, < 11.110.0.97 | ≥ 11.112.0.0, < 11.118.0.63 | ≥ 11.120.0.0, < 11.126.0.54 | ≥ 11.128.0.0, < 11.130.0.19 | ≥ 11.132.0.0, < 11.132.0.29 | ≥ 11.134.0.0, < 11.134.0.20 | ≥ 11.136.0.0, < 11.136.0.5
- webpros•whm
≥ 11.40.0.0, < 11.86.0.41 | ≥ 11.88.0.0, < 11.110.0.97 | ≥ 11.112.0.0, < 11.118.0.63 | ≥ 11.120.0.0, < 11.126.0.54 | ≥ 11.128.0.0, < 11.130.0.19 | ≥ 11.132.0.0, < 11.132.0.29 | ≥ 11.134.0.0, < 11.134.0.20 | ≥ 11.136.0.0, < 11.136.0.5
References (7)
- https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026
- https://docs.cpanel.net/release-notes/release-notes
- https://docs.wpsquared.com/changelogs/versions/changelog/#13617
- https://www.namecheap.com/status-updates/ongoing-critical-security-vulnerability-in-cpanel-april-28-2026
- https://www.vulncheck.com/advisories/cpanel-and-whm-authentication-bypass-via-login-flow
- https://github.com/watchtowrlabs/watchTowr-vs-cPanel-WHM-AuthBypass-to-RCE.py
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-41940