<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[(malwarebytes.com) Critical Authentication Bypass Vulnerability in cPanel&#x2F;WHM Actively Exploited by Threat Actors]]></title><description><![CDATA[<p>(malwarebytes.com) Critical Authentication Bypass Vulnerability in cPanel/WHM Actively Exploited by Threat Actors</p><p>Critical authentication bypass in cPanel/WHM (CVE-2026-41940) is under active exploitation. Attackers gain admin access without credentials, impacting millions of sites. CISA has listed it in the KEV catalog.</p><p>In brief - A zero-day flaw in cPanel/WHM (CVE-2026-41940) allows unauthenticated admin access, with active exploitation confirmed. Hosting providers are urged to patch immediately and restrict interface access.</p><p>Technically - CVE-2026-41940 affects cPanel/WHM v11.40+ (including DNSOnly/WP Squared), enabling privilege escalation via authentication bypass. Exploitation observed since February 2026; patches released April 28. Mitigations include patching, MFA enforcement, and access restrictions. Over 1M sites at risk.</p><p>Source: <a href="https://www.malwarebytes.com/blog/news/2026/05/actively-exploited-cpanel-bug-exposes-millions-of-websites-to-takeover" rel="nofollow noopener"><span>https://www.</span><span>malwarebytes.com/blog/news/202</span><span>6/05/actively-exploited-cpanel-bug-exposes-millions-of-websites-to-takeover</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" rel="tag">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/01c16cb0-024c-430f-a25b-0ce49597f8f2/malwarebytes.com-critical-authentication-bypass-vulnerability-in-cpanel-whm-actively-exploited-by-threat-actors</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 03:30:31 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/01c16cb0-024c-430f-a25b-0ce49597f8f2.rss" rel="self" type="application/rss+xml"/><pubDate>Fri, 01 May 2026 11:03:48 GMT</pubDate><ttl>60</ttl></channel></rss>