Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (picussecurity.com) CVE-2026-41940: Deep Dive into the cPanel & WHM Authentication Bypass Exploit Affecting 1.5 Million Servers

(picussecurity.com) CVE-2026-41940: Deep Dive into the cPanel & WHM Authentication Bypass Exploit Affecting 1.5 Million Servers

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (picussecurity.com) CVE-2026-41940: Deep Dive into the cPanel & WHM Authentication Bypass Exploit Affecting 1.5 Million Servers

    Critical authentication bypass in cPanel & WHM (CVE-2026-41940, CVSS 9.8) exposes 1.5M servers to pre-auth RCE. Actively exploited since Feb 2026, this zero-day grants root access via session hijacking. Patch immediately, rotate credentials, and purge sessions.

    In brief - CVE-2026-41940 is a critical authentication bypass in cPanel & WHM, allowing unauthenticated attackers to gain root access to 1.5M internet-facing servers. Exploited in the wild since February 2026, it requires immediate patching and mitigation.

    Technically - The exploit chains a CRLF injection in session files with a malformed cookie to disable encryption and manipulate session caching. Attackers inject newline-laced credentials via Basic-auth, bypass encryption, and plant a 'successful_internal_auth_with_timestamp' flag in session files. The flaw stems from missing sanitization, encryption bypass, and JSON cache discrepancies. Detection involves monitoring for CRLF in session files, privileged keys in failed logins, and anomalous access-log sequences.

    Source: https://www.picussecurity.com/resource/blog/cve-2026-41940-explained-cpanel-whm-authentication-bypass-hit-1-5m-servers

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups