Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»cPanel, WHM emergency update fixes critical auth bypass bug
    Cybersecurity

    cPanel, WHM emergency update fixes critical auth bypass bug

    adminBy adminApril 29, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    cPanel, WHM emergency update fixes critical auth bypass bug
    Share
    Facebook Twitter LinkedIn Pinterest Email

    cPanel, WHM emergency update fixes critical auth bypass bug

    A critical vulnerability affecting all but the latest versions of cPanel and the WebHost Manager (WHM) dashboard could be exploited to obtain access to the control panel without authentication.

    The security issue has been addressed in an emergency update that requires running a command manually to retrieve a patched version of the software.

    Owned by WebPros International, WHM and cPanel are Linux-based web hosting control panels for server and website management. While WHM provides server-level control, cPanel provides administrator access to the website backend, webmail, and databases.

    image

    Both products are among the most widely deployed hosting control panels, popular with many hosting providers for their standardized interfaces, ease of use for non-technical users, and deep integration with common hosting stacks.

    No technical details have been publicly disclosed, but the severity of the issue appears significant, as Namecheap temporarily blocked access to ports 2083 and 2087 used for WHM and cPanel to protect customers until patches were available.

    “We regret to inform you that a critical security vulnerability has been identified in cPanel software affecting all currently supported versions,” Namecheap said.

    The hosting provider stated that the vulnerability, which has not received an official identifier, “relates to an authentication login exploit that could allow unauthorized access to the control panel.”

    A few hours after Namecheap’s notification, cPanel published a security bulletin informing that the security issue had been addressed in the following product versions:

    • 11.110.0.97
    • 11.118.0.63
    • 11.126.0.54
    • 11.132.0.29
    • 11.136.0.5
    • 11.134.0.20

    To install a safe version, the vendor recommends that administrators execute the command /scripts/upcp –force, which runs the cPanel update process and forces it to execute even if the system thinks it already runs on the latest version.

    Servers running an unsupported version of cPanel are ineligible for security updates. In this case, administrators are recommended to upgrade to a supported version as soon as possible.

    The discovery of the vulnerability has not been publicly attributed, and there’s currently no tracking ID for the issue.

    An attacker gaining access to cPanel can control everything present in the hosting account, from websites and data to email. They can use the access to plant backdoors or web shells, redirect users to malicious locations, steal sensitive files, send spam or phishing emails, or collect passwords from configuration files.

    WHM provides access to the entire server and all the websites it hosts. This means that a threat actor could create and delete cPanel accounts, establish persistent access on the machine, and use it for various malicious activities (e.g., proxy traffic, spam, malware delivery, botnet).

    Website owners using the affected management interfaces should ensure that they have updated to a patched version.


    article image

    AI chained four zero-days into one exploit that bypassed both renderer and OS sandboxes. A wave of new exploits is coming.

    At the Autonomous Validation Summit (May 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls hold, and closes the remediation loop.

    Claim Your Spot

    auth bug bypass cPanel Critical Emergency fixes update WHM
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleFresh LiteLLM Vulnerability Exploited Shortly After Disclosure
    Next Article Content marketing funnel: stages, templates & metrics
    admin
    • Website

    Related Posts

    SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

    April 29, 2026

    CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog

    April 29, 2026

    Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure

    April 29, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

    April 29, 2026

    Can a fake brand win in AI search? New experiment says yes

    April 29, 2026

    Auvik bets agentic AI can fill the networking skills gap

    April 29, 2026

    CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog

    April 29, 2026
    Categories
    • Blogging (70)
    • Cybersecurity (1,583)
    • Privacy & Online Earning (188)
    • SEO & Digital Marketing (973)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (250)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

    April 29, 2026

    Can a fake brand win in AI search? New experiment says yes

    April 29, 2026

    Auvik bets agentic AI can fill the networking skills gap

    April 29, 2026
    Most Popular
    • SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack
    • Can a fake brand win in AI search? New experiment says yes
    • Auvik bets agentic AI can fill the networking skills gap
    • CISA adds Microsoft, ConnectWise vulnerabilities to active exploitation catalog
    • Content marketing funnel: stages, templates & metrics
    • cPanel, WHM emergency update fixes critical auth bypass bug
    • Fresh LiteLLM Vulnerability Exploited Shortly After Disclosure
    • Vect 2.0 Ransomware Acts as Wiper, Thanks to Design Error
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.