A crucial vulnerability affecting all however the newest variations of cPanel and the WebHost Supervisor (WHM) dashboard could possibly be exploited to acquire entry to the management panel with out authentication.
The security concern has been addressed in an emergency replace that requires operating a command manually to retrieve a patched model of the software program.
Owned by WebPros Worldwide, WHM and cPanel are Linux-based website hosting management panels for server and web site administration. Whereas WHM offers server-level management, cPanel offers administrator entry to the web site backend, webmail, and databases.
Each merchandise are among the many most generally deployed internet hosting management panels, fashionable with many internet hosting suppliers for his or her standardized interfaces, ease of use for non-technical customers, and deep integration with frequent internet hosting stacks.
No technical particulars have been publicly disclosed, however the severity of the problem seems vital, as Namecheap briefly blocked entry to ports 2083 and 2087 used for WHM and cPanel to guard clients till patches had been out there.
“We remorse to tell you {that a} crucial security vulnerability has been recognized in cPanel software program affecting all at the moment supported variations,” Namecheap mentioned.
The internet hosting supplier said that the vulnerability, which has not obtained an official identifier, “pertains to an authentication login exploit that might permit unauthorized entry to the management panel.”
A couple of hours after Namecheap’s notification, cPanel revealed a security bulletin informing that the security concern had been addressed within the following product variations:
- 11.110.0.97
- 11.118.0.63
- 11.126.0.54
- 11.132.0.29
- 11.136.0.5
- 11.134.0.20
To put in a secure model, the seller recommends that directors execute the command /scripts/upcp –power, which runs the cPanel replace course of and forces it to execute even when the system thinks it already runs on the most recent model.
Servers operating an unsupported model of cPanel are ineligible for security updates. On this case, directors are really useful to improve to a supported model as quickly as doable.
The invention of the vulnerability has not been publicly attributed, and there’s at the moment no monitoring ID for the problem.
An attacker getting access to cPanel can management the whole lot current within the internet hosting account, from web sites and knowledge to electronic mail. They will use the entry to plant backdoors or net shells, redirect customers to malicious areas, steal delicate information, ship spam or phishing emails, or accumulate passwords from configuration information.
WHM offers entry to your entire server and all of the web sites it hosts. Because of this a menace actor might create and delete cPanel accounts, set up persistent entry on the machine, and use it for varied malicious actions (e.g., proxy visitors, spam, malware supply, botnet).
Web site homeowners utilizing the affected administration interfaces ought to be sure that they’ve up to date to a patched model.

AI chained 4 zero-days into one exploit that bypassed each renderer and OS sandboxes. A wave of recent exploits is coming.
On the Autonomous Validation Summit (Could 12 & 14), see how autonomous, context-rich validation finds what’s exploitable, proves controls maintain, and closes the remediation loop.
Declare Your Spot



