cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
https://www.vulncheck.com/advisories/cpanel-and-whm-authentication-bypass-via-login-flow
https://support.cpanel.net/hc/en-us/articles/40073787579671-cPanel-WHM-Security-Update-04-28-2026
https://thehackernews.com/2026/05/cpanel-cve-2026-41940-under-active.html
https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html
https://www.securityweek.com/over-40000-servers-compromised-in-ongoing-cpanel-exploitation/
https://www.darkreading.com/threat-intelligence/exploit-cyber-frenzy-critical-cpanel-vulnerability
https://www.theregister.com/2026/05/01/critical_cpanel_vuln_hits_cisa/
https://www.databreachtoday.com/attacks-surge-against-vulnerable-cpanel-whm-software-a-31571
https://therecord.media/cisa-orders-federal-agencies-to-patch-cpanel-bug
https://www.theregister.com/2026/04/30/cpanel_whn_cves/
https://www.securityweek.com/critical-cpanel-whm-vulnerability-exploited-as-zero-day-for-months/
https://www.helpnetsecurity.com/2026/04/30/cpanel-zero-day-vulnerability-cve-2026-41940-exploited/
https://cyberscoop.com/cpanel-authentication-bypass-vulnerability-cve-2026-41940-exploited/
https://arcticwolf.com/resources/blog/cve-2026-41940/
https://thehackernews.com/2026/04/critical-cpanel-authentication.html
Published: 2026-04-29
Updated: 2026-05-04
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 9.3
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: Critical
EPSS: 0.88634
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest