CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 12, 2026

Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers

Cybersecurity News Archived May 12, 2026 ✓ Full text saved

A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide. Tracked as CVE-2026-41940 and bearing an apocalyptic maximum severity score of 9.8, this critical flaw has essentially handed the keys to the kingdom directly to cybercriminals. Without needing a single username or password, unauthenticated remote attackers are ruthlessly shattering security […] The post Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers appeared fi

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Hackers Abuse CVE-2026-41940 to Take Over cPanel and WHM Servers By Abinaya May 12, 2026 A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide. Tracked as CVE-2026-41940 and bearing an apocalyptic maximum severity score of 9.8, this critical flaw has essentially handed the keys to the kingdom directly to cybercriminals. Without needing a single username or password, unauthenticated remote attackers are ruthlessly shattering security perimeters to seize absolute administrator control. Threat actors are now aggressively weaponizing this zero-day exploit, unleashing a tidal wave of ransomware, parasitic cryptominers, and deeply embedded backdoors across vulnerable Linux environments. Since its public disclosure in late April 2026, threat intelligence platforms have observed a massive surge in automated attacks targeting this vulnerability. DailyDarkWeb reports that over 2,000 unique IP addresses worldwide, primarily originating from the United States, Germany, Brazil, and the Netherlands, are actively scanning for and exploiting this flaw. Highlighting the severity of the threat, security researchers at Ctrl-Alt-Intel revealed on May 2. That hackers successfully weaponized this vulnerability to breach Southeast Asian government and military networks, stealing nearly 4.37 GB of sensitive archives dating from 2020 to 2024. CVE-2026-41940 Hijacks cPanel Servers Security analysts from XLab have attributed a highly sophisticated, ongoing campaign to a covert hacking collective internally dubbed “Mr_Rot13”. Operating quietly since at least 2020, this group has a history of deploying malicious PHP backdoors that completely evade detection on major antivirus scanning platforms. JavaScript code is injected (Source: Xlab) The group earned its moniker by frequently using the Rot13 algorithm to obfuscate its command-and-control (C2) infrastructure within injected JavaScript payloads. Recent investigations reveal that Mr_Rot13 is a highly organized operation rather than an opportunistic script-kiddie ring. The group relies on custom, well-maintained malware and reacts dynamically to security researchers probing their infrastructure. For example, they frequently rotate their Telegram bot tokens and upgrade their malware payloads to evade active detection and analysis. The infection process begins when attackers exploit CVE-2026-41940 to bypass authentication, granting them immediate administrator privileges on the target server. Without providing a username or password, the threat actors deploy a Go-based injector tool named “Payload.” Researchers from XLab note that the code structure and logging style of this tool appear to be generated by artificial intelligence. Remotely manage compromised systems via a web page (Source: Xlab) Once executed, the injector immediately alters the server’s root password and implants malicious SSH public keys to ensure persistent backdoor access. The malware then drops a custom PHP webshell known as “Cpanel-Python”. It injects malicious JavaScript into the server’s custom login pages. This injected script actively steals user credentials, User-Agent strings, and URLs, forwarding the stolen data to a remote C2 server via an AJAX request. As a final step, the attackers deploy “Filemanager,” a powerful cross-platform remote control Trojan. This Trojan supports Linux, Windows, and Darwin operating systems, allowing attackers to access a web-based console to execute remote commands and manage files. Stolen server configurations and database credentials are then exfiltrated through dual channels, sending information back to both the group’s web domains and a dedicated Telegram bot. Indicators of Compromise (IOCs): Domains: cp.dene.de[.]com wrned[.]com wpsock[.]com MD5 Hashes: fb1bc3f935fdeb3555465070ba2db33c 9305b4ebbb4d39907cf36b62989a6af3 2286f126ab4740ccf2595ad1fa0c615c Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM. Follow us on Google News, LinkedIn, and X to Get More Instant Updates. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Abinayahttps://cybersecuritynews.com/ Abi is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space. Trending News Vimeo Data Breach Exposes 119,000 Users Unique Email Addresses Dirty Frag Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released Remus Infostealer Uses Lumma-Style Browser Key Theft and Application-Bound Encryption Bypass 84 TanStack npm Packages Hacked in Ongoing Supply-Chain Attack Targeting CI Credentials Trellix Breach – RansomHouse Claims Access to Parts of Source Code Latest News Cyber Security News Popular Go Library fsnotify Raises Supply Chain Alarms After Maintainer Access Changes Cyber Security Google Warns of Hackers Using AI to Create Working Zero-Day Exploit Cyber Security News Hackers Use PlugX-Like DLL Sideloading Chain in Fake Claude Malware Campaign Cyber Security News Hackers Use Fake DeepSeek TUI GitHub Repositories to Deliver Malware Cyber Security News ShinyHunters Breaches Instructure Canvas LMS Through Free-For-Teacher Account Program
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 12, 2026
    Archived
    May 12, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗