Free cPanel CVE-2026-41940 Vulnerability Scanner — Authentication Bypass Checker
Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners Whitelabel / Reseller Affiliate Program Pay with Crypto System Status
Legal & Support
Contact Us Security Trust Center Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs/MSSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services Compliance

CVSS 9.8 Critical — CISA KEV — Actively Exploited

cPanel CVE-2026-41940
Vulnerability Scanner

Check if your cPanel / WHM server is vulnerable to the critical authentication bypass that put 1.5 million hosting servers at risk. Passive version check — no exploit code, no credentials, no server changes.

Non-invasive & informational only. This tool performs a passive HTTP GET to read the publicly-visible cPanel version number from your login page. No exploit payload is sent, no authentication is attempted, and no server state is modified. Results are provided for informational purposes only and do not constitute professional security advice. Always consult a qualified security professional before making changes to production systems.
9.8
CVSS v3.1 Score
1.5M
Exposed Servers
65 Days
0-day Before Patch
CISA KEV
Known Exploited

Only scan servers you own or have written permission to test. Port checked: 2082 (cPanel HTTP), 2083 (cPanel HTTPS), 2086 (WHM HTTP), 2087 (WHM HTTPS).

How the Attack Works

CRLF Injection → Session Hijacking → Root Access

CVE-2026-41940 is a CRLF injection in cPanel's session-handling code. By injecting raw carriage-return/line-feed sequences into an Authorization header, an attacker can write arbitrary properties to a session file — including user=root — and gain full admin access without any credentials.

Attack Flow
Attacker
Authorization header with CRLF + user=root
cPanel/WHM Login Endpoint
:2082 / :2083 / :2086 / :2087
Session file written without input sanitization
Session file: user=root injected
Cookie bypasses encryption check
Full root WHM access — no password
CWE-306: Missing Authentication for Critical Function
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Feb 23, 2026 — First exploitation in the wild

CVE-2026-41940 was being actively exploited as a zero-day against hosting providers. Attackers targeted WHM accounts at shared hosting companies to deploy malware and pivot to customer sites.

Apr 28, 2026 — cPanel patch released

WebPros released patched builds across 8 branches (11.86–11.136). By this date the vulnerability had been exploited for over 2 months with no vendor fix available.

Apr 30, 2026 — Added to CISA KEV catalog

CISA added CVE-2026-41940 to the Known Exploited Vulnerabilities catalog, requiring all U.S. federal agencies to remediate by May 3, 2026.

May 3, 2026 — CISA remediation deadline

Federal deadline passed. ~1.5M internet-exposed cPanel instances remain. Researchers estimate over 200,000 remain unpatched as of this date based on Shodan version telemetry.

Patched Versions

All 8 Branches — Patched April 28, 2026

Any version below the minimum patched build for your branch is vulnerable. Most production servers should be on the 11.136.x stable branch.

BranchMinimum Patched BuildStatusNotes
11.136.x11.136.0.5 Current Stable Most production servers — update recommended
11.134.x11.134.0.20SupportedPrevious LTS
11.132.x11.132.0.29Supported 
11.130.x11.130.0.19Supported 
11.126.x11.126.0.54OlderConsider upgrade to 11.136
11.118.x11.118.0.63OlderEOL soon — upgrade strongly advised
11.110.x11.110.0.97LegacyEOL — upgrade to 11.136 immediately
11.86.x11.86.0.41LegacyEOL — upgrade to 11.136 immediately

Source: NVD CVE-2026-41940 · WebPros security advisory · Rapid7 ETR. Branch versions above the minimum listed build are patched. WP Squared (WebPros managed WordPress) is patched at version 136.1.7.

Continuous Monitoring

Stop checking manually.
Flowtriq does it automatically.

This tool checks one server, one CVE, one time. Flowtriq's Exposure Scanner runs continuously across every node in your infrastructure, checking for known CVEs, exposed services, and misconfigurations — and alerts you the moment something changes.

  • Scans every node for CVE-2026-41940 and 100+ known CVEs automatically
  • Detects exploitation attempts — CRLF injection patterns, anomalous WHM sessions, post-exploitation traffic
  • Alerts via Slack, Discord, PagerDuty, email, and 8+ more channels in under 1 second
  • PCAP forensics capture evidence for incident response and insurance claims
  • Built for hosting providers — per-node isolation, multi-tenant workspaces, white-label status pages

7-day free trial · No credit card · $9.99/node/month · 60-second setup

Flowtriq — Exposure Scanner
Node: cp.yourhost.com — Last scan: just now
CVE-2026-41940 VULNERABLE
CVE-2025-38291 Patched
CVE-2025-31200 Patched
Open port :11211 UDP EXPOSED
DNS open resolver Secured
NTP monlist Scanning…
1 critical vulnerability found — alert sent to Slack & PagerDuty

Fix It Now

Remediation Steps

1

Update cPanel immediately via upcp

The fastest fix. Run from root SSH on the server — this downloads and applies the latest patched build for your current branch.

# Force update to latest patched version
/usr/local/cpanel/scripts/upcp --force

# Verify installed version after update
cat /usr/local/cpanel/version
2

Alternatively: update via WHM UI

Log in to WHM → navigate to cPanel StoreUpgrade to Latest Version. This is equivalent to running upcp.

3

If you can't patch immediately: restrict WHM ports

Restrict WHM access (ports 2086/2087) to trusted IPs using CSF or iptables. This doesn't fix the vulnerability but significantly reduces exposure.

# Block WHM ports from all except trusted IP
iptables -A INPUT -p tcp --dport 2086 ! -s YOUR_TRUSTED_IP -j DROP
iptables -A INPUT -p tcp --dport 2087 ! -s YOUR_TRUSTED_IP -j DROP
4

Check access logs for prior exploitation

If you were unpatched during the exploitation window (Feb 23 – Apr 28, 2026), check logs for CRLF injection attempts — look for \r\n or %0d%0a in Authorization headers.

# Search WHM access logs for CRLF injection attempts
grep -r $'\\r\\n\|%0d%0a\|%0D%0A' /usr/local/cpanel/logs/access_log

# Look for unusual session file modifications
find /var/cpanel/sessions -newer /tmp -ls 2>/dev/null | head -50
5

Enable continuous exposure monitoring

Manual patching is reactive. Flowtriq's Exposure Scanner automatically checks your cPanel nodes for known CVEs, alerts you when new vulnerabilities affect your stack, and monitors for post-exploitation indicators — so you're never 65 days behind on a critical 9.8 again.

Built for Hosting Providers

Don't wait for the next zero-day to find out you're exposed.

Flowtriq monitors every node in your infrastructure for CVE exposure, DDoS attacks, and network anomalies — continuously, automatically, from a 60-second agent deploy.

Start Free Trial Exposure Scanner Docs
7-day free trial No credit card $9.99/node/month 60-second deploy
Export your results

FAQ

Frequently Asked Questions

What is CVE-2026-41940?

CVE-2026-41940 is a critical CVSS 9.8 authentication bypass in cPanel & WHM. A CRLF injection flaw in session handling lets an unauthenticated attacker inject arbitrary session properties — including user=root — bypassing all access controls. No credentials, no prior account, no user interaction required. Approximately 1.5 million cPanel instances are internet-exposed.

Is CVE-2026-41940 actively exploited?

Yes. It was exploited as a zero-day starting at least February 23, 2026, more than two months before the vendor patch on April 28, 2026. CISA added it to the Known Exploited Vulnerabilities (KEV) catalog. Federal agencies had a remediation deadline of May 3, 2026.

How does this scanner check for the vulnerability?

This tool makes a single passive HTTP GET to the publicly-visible cPanel login page on standard ports (2082/2083/2086/2087) to read the version number cPanel displays. It compares that version against the patched build table. No exploit payload is sent, no authentication is attempted, no credentials are used, and no session state is modified.

Which cPanel versions are patched?

Patches shipped April 28, 2026 across 8 branches: 11.86.0.41, 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.130.0.19, 11.132.0.29, 11.134.0.20, and 11.136.0.5. Run upcp --force or update via WHM → cPanel Store → Upgrade to Latest Version.

What do I do if my server shows as vulnerable?

Update immediately: run /usr/local/cpanel/scripts/upcp --force from root SSH, or use WHM → cPanel Store → Upgrade. If patching is delayed, restrict ports 2086/2087 to trusted IPs via CSF or iptables. Check access logs for CRLF sequences (\r\n) in Authorization headers as indicators of prior exploitation attempts.

Does Flowtriq detect exploitation attempts for this CVE?

Yes. Flowtriq's Exposure Scanner proactively checks nodes for unpatched CVEs including CVE-2026-41940. The ftagent monitors kernel-level network patterns and flags anomalous authentication traffic, unusual outbound connections from cPanel processes, and post-exploitation lateral movement — giving you detection even when you can't immediately patch.