cPanel and WHM Patch Three Critical Vulnerabilities to Improve Security

Summary: cPanel released updates to address three critical vulnerabilities in Web Host Manager (WHM) and cPanel, which could allow for privilege escalation, remote code execution, or denial of service.

cPanel and WHM fix three new vulnerabilities that could compromise hosting servers

The company behind cPanel & WHM published security patches to fix three recently discovered vulnerabilities affecting servers that use cPanel and WHM, two of the most popular hosting management platforms in Linux environments.

The flaws could have allowed attackers to perform unauthorized actions on vulnerable systems, generating concern especially among hosting providers, server administrators, and companies that rely on shared infrastructures.

According to the report published by The Hacker News, the vulnerabilities were solved in the latest versions of the software following internal investigations and security reports. Although there is no evidence of active mass exploitation, experts warn that cPanel remains an extremely attractive target for cybercriminals due to the huge number of servers exposed to the internet that use this technology.

cPanel and WHM are widely used tools to manage Linux servers, hosting accounts, domains, emails, databases, and web configurations. Their popularity means that any vulnerability in these platforms could have a potentially huge impact on websites and online services worldwide.

The three flaws fixed affect different system components, and depending on the server's configuration, they could facilitate improper access or the execution of certain actions with elevated privileges. Although the complete technical details were not publicly disclosed to prevent immediate misuse, the release of patches usually starts a race against time between administrators and attackers who try to analyze the fixes to develop exploits.

This phenomenon, known as “patch diffing”, is increasingly common in the cybersecurity ecosystem. Once updates are published, researchers and malicious actors compare the corrected code with previous versions to identify exactly what vulnerability was solved and how it could be exploited on servers that have not yet been updated.

The risk is especially significant in the shared hosting world, where a single vulnerable server can host hundreds or even thousands of different websites. A successful compromise could allow for data theft, malicious modifications, malware distribution, or subsequent attacks against clients hosted on the same infrastructure.

Furthermore, platforms like cPanel often become priority targets for criminal groups because they concentrate enormous amounts of sensitive information: credentials, databases, DNS configurations, emails, and administrative access to multiple domains.

In recent years, attacks against hosting providers have increased considerably. Cybercriminals seek to compromise central infrastructures that allow them to affect multiple victims simultaneously instead of attacking individual sites one by one.

Experts recommend applying the security updates as soon as possible and verifying that the systems are running corrected versions of cPanel and WHM. They also advise reviewing administrative access, restricting publicly exposed admin panels, and using multi-factor authentication to reduce additional risks.

In many cases, one of the main problems is not the absence of patches, but the delay in applying them. Numerous servers remain vulnerable for weeks or months after the fixes have been published, providing an ideal window for automated attackers scanning the internet for outdated systems.

The situation demonstrates how even widely used and considered mature tools continue to face significant security risks. And in an ecosystem where millions of websites depend daily on management platforms like cPanel, every new vulnerability acquires almost immediate global relevance.

Original source: The Hacker News.

Key facts

  • Correction of three vulnerabilities in cPanel and WHM.
  • The flaws include CVE-2026-29202 (arbitrary Perl code execution) and CVE-2026-29203 (unsafe symlink handling).
  • Requires updating to specific versions, such as 11.136.0.9 or later.

Why it matters

It is crucial that cPanel and WHM users update their systems immediately to mitigate these risks. Failing to patch these vulnerabilities leaves systems exposed to attacks that compromise the integrity and availability of web hosting services. Keeping the software up to date is the best defense against high-impact exploits.

X profile@thehackersnewshttps://twitter.com/thehackersnews
Embedded content for: cPanel and WHM Patch Three Critical Vulnerabilities to Improve Security