CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 11, 2026

New cPanel and WHM Flaws Enable Code Execution, DoS Attacks

Cybersecurity News Archived May 11, 2026 ✓ Full text saved

cPanel has disclosed three critical security vulnerabilities tracked as CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203 affecting its widely deployed cPanel & WHM web hosting control panel and WP Squared (WP2) platform. The flaws, patched on May 8, 2026, expose servers to arbitrary file reads, Perl code injection, and denial-of-service (DoS) attacks, making immediate patching essential for hosting […] The post New cPanel and WHM Flaws Enable Code Execution, DoS Attacks appeared first on Cyber

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News New cPanel and WHM Flaws Enable Code Execution, DoS Attacks By Guru Baran May 10, 2026 cPanel has disclosed three critical security vulnerabilities tracked as CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203 affecting its widely deployed cPanel & WHM web hosting control panel and WP Squared (WP2) platform. The flaws, patched on May 8, 2026, expose servers to arbitrary file reads, Perl code injection, and denial-of-service (DoS) attacks, making immediate patching essential for hosting providers and server administrators. In April, another cPanel vulnerability, tracked as CVE-2026-41940, was exploited in the wild, enabling attackers to completely bypass login mechanisms. CVE-2026-29201: Arbitrary File Read via Path Traversal The first vulnerability resides in the feature::LOADFEATUREFILE adminbin call, which fails to adequately validate the feature file name parameter. An attacker can pass a relative path as the argument, causing an arbitrary file on the server to be made world-readable. This type of path traversal flaw can expose sensitive system files, including configuration files, credentials, and private keys — giving attackers a foothold for deeper compromise. CVE-2026-29202: Perl Code Injection in User Creation API The second and most severe flaw is a Perl code injection vulnerability discovered in the create_user API call, specifically related to the plugin parameter. When unsanitized input reaches this parameter, attackers can inject and execute arbitrary Perl code on the server. Remote code execution (RCE) vulnerabilities of this nature carry the highest risk, potentially allowing full server takeover, data exfiltration, and deployment of malware or backdoors across hosted environments. CVE-2026-29203: Unsafe Symlink Handling The third flaw stems from unsafe symlink handling that permits a user to chmod an arbitrary file on the system. This misconfiguration can be exploited to disrupt critical system operations, resulting in denial-of-service conditions, and could also be chained with other vulnerabilities to escalate privileges and gain unauthorized administrative access. Affected Versions and Patched Releases All three vulnerabilities affect the same range of cPanel & WHM versions. cPanel has released patches across all active branches. Administrators should update to one of the following versions or higher: 11.136.0.9, 11.134.0.25, 11.132.0.31, 11.130.0.22, 11.126.0.58, 11.124.0.37, 11.118.0.66, 11.110.0.116, 11.110.0.117, 11.102.0.41, 11.94.0.30, or 11.86.0.43. WP Squared users should upgrade to version 11.136.1.10 or higher. Servers running CentOS 6 or CloudLinux 6 can apply a direct update to version 110.0.114 by first setting the upgrade tier with the following command: sed -i "s/CPANEL=.*/CPANEL=cl6110/g" /etc/cpupdate.conf How to Apply the Patch Administrators can update their cPanel installation immediately by running the forced update script: /scripts/upcp --force Once completed, verify the installed version using: /usr/local/cpanel/cpanel -V Confirm the version matches one of the patched releases listed above before considering the remediation complete. Given that CVE-2026-29202 enables direct code execution and CVE-2026-29203 opens the door to privilege escalation, these flaws pose a serious risk to shared hosting environments where multiple tenants operate on a single server. Hosting providers running unpatched cPanel installations face significant exposure to lateral movement and full server compromise. Administrators are urged to apply available patches without delay and review server logs for any signs of exploitation activity. Cybercriminals now enter through your suppliers instead of your front door – Free Webinar Tags cyber security cyber security news vulnerability Copy URL Linkedin Twitter ReddIt Telegram Guru Baranhttps://cybersecuritynews.com Gurubaran KS is a cybersecurity analyst, and Journalist with a strong focus on emerging threats and digital defense strategies. He is the Co-Founder and Editor-in-Chief of Cyber Security News, where he leads editorial coverage on global cybersecurity developments. Trending News Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released New Salat Malware Uses QUIC and WebSocket Channels for Stealthy Remote Control Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass CloudZ RAT Abuses Microsoft Phone Link to Steal SMS OTPs and Mobile Notifications New Attribution Framework Connects APT Campaigns Through Strategic, Operational, and Technical Layers Latest News Cyber Security News NVIDIA Data Breach Reportedly Exposes Personal Information of GeForce Users Cyber Security Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident Cyber Security Critical Microsoft 365 Copilot Vulnerabilities Expose sensitive Information Cyber Security News New PamDOORa Backdoor Attacking Linux Systems to Steal SSH Credentials Cyber Security News Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture Capabilities
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 11, 2026
    Archived
    May 11, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗