HackWatch
! High riskVU Vulnerability

cPanel Zero-Day CVE-2026-41940 Exploited for Months Before Patch Release

Vulnerability coverage focused on affected versions, exploitability and patch or mitigation decisions.

Exploitability matters here. Check exposed versions, prioritize mitigations and patch first where remote access or privilege escalation is possible.
cPanel Zero-Day CVE-2026-41940 Exploited for Months Before Patch Release - HackWatch vulnerability alert image
HackWatch vulnerability alert image for: cPanel Zero-Day CVE-2026-41940 Exploited for Months Before Patch Release
Marcin Pocztowski

Infrastructure Security Editor

Marcin Pocztowski

Infrastructure and Vulnerability Response

By: Marcin Pocztowski

Responsible editor: Marcin Pocztowski / Infrastructure and Vulnerability Response

Infrastructure Security Editor: Marcin Pocztowski / Infrastructure and Vulnerability Response

Last reviewed by: Marcin Pocztowski on Apr 30, 2026

Technical review credentials: Security+ evidence | RHCSA evidence | JNCIS-SEC evidence

Published on HackWatch: Apr 30, 2026

Source date: Apr 30, 2026

Last updated: Apr 30, 2026

Incident status: Active threat

Last verified: Apr 30, 2026

Corroborating sources: 1

Trust note:This alert is maintained under HackWatch's editorial policy, with visible source records, a named responsible editor and a correction channel for disputed facts.

AI tools may assist HackWatch with initial monitoring and source clustering. The public article is reviewed, fact-checked and edited by a real HackWatch reviewer before publication or material updates. Last human review: Apr 30, 2026.

Technical reviewer note: Marcin Pocztowski reviewed this alert on Apr 30, 2026 from an administrator's point of view, checking CVE-2026-41940, CVE-2026-41940 against vendor, CVE and advisory context before accepting the risk language. His remediation check is practical: confirm the affected version first, restrict reachable management surfaces as he would on Juniper, Cisco or Mikrotik routers, then patch or apply vendor mitigations only where the 1 corroborating source supports that scope.

Review our editorial policy or send corrections to [email protected].

Active threat. The incident should still be treated as active until confirmed mitigation or patch adoption is verified.

A critical authentication bypass vulnerability in cPanel, tracked as CVE-2026-41940, has been actively exploited by attackers since at least February 2026. The flaw, which affects web hosting control panels widely used by shared hosting providers, was patched only recently after months of in-the-wild abuse. Administrators are urged to update immediately to prevent unauthorized access and potential account takeover.

GLOBAL, April 30, 2026, 13:47 UTC

  • A critical zero-day vulnerability in cPanel has been exploited since February 2026.
  • The flaw allows authentication bypass, risking unauthorized control over hosting accounts.
  • Patch released after months of active exploitation; immediate updates are essential.

Security researchers have confirmed that a severe authentication bypass vulnerability in cPanel, identified as CVE-2026-41940, has been actively exploited by threat actors for several months before a public patch was issued. The vulnerability enables attackers to bypass login controls and gain unauthorized access to web hosting accounts managed through cPanel.

cPanel is a widely used web-based control panel that allows users and hosting providers to manage websites, email accounts, and server configurations. Its prevalence in shared hosting environments means that a successful exploit can compromise numerous websites and services.

Researchers from watchTowr first publicly disclosed technical details of the flaw on April 29, 2026. However, evidence shows attackers were exploiting the vulnerability as early as February 23, 2026, and likely before that date. This extended window of exploitation before patch availability raises concerns about the scope of compromised accounts.

The vulnerability stems from an authentication bypass mechanism that attackers can leverage to access accounts without valid credentials. Once inside, attackers can manipulate website files, inject malicious code, or escalate privileges, potentially leading to data breaches or hosting infrastructure compromise.

cPanel issued a security advisory alongside the release of a patch that addresses CVE-2026-41940. The company emphasized the criticality of the update and urged all users and hosting providers to apply it immediately to block ongoing exploitation.

Shared hosting providers, who often manage multiple client accounts on a single server, are particularly at risk. An attacker compromising one account could pivot to others or disrupt multiple websites hosted on the same infrastructure.

Security analysts warn that organizations using cPanel should assume potential compromise if they did not apply mitigations before the patch release. Incident response measures, including reviewing access logs and resetting credentials, are recommended.

The delayed patch release following months of active exploitation highlights the challenges in detecting and mitigating zero-day vulnerabilities in widely deployed software. It also underscores the importance of proactive monitoring and rapid response capabilities within hosting environments.

Looking ahead, cPanel users should monitor for suspicious activity and ensure their hosting providers maintain timely patch management practices. Attackers may continue targeting unpatched systems or attempt to exploit related weaknesses.

Risk remains significant for websites relying on cPanel versions prior to the patch. Failure to update promptly could result in unauthorized access, website defacement, data theft, or use of compromised servers in broader cyberattacks.

In response to this incident, hosting providers and administrators should:

  • Immediately apply the official cPanel patch addressing CVE-2026-41940.
  • Audit user accounts and access logs for unusual login attempts or unauthorized changes.
  • Reset passwords and API keys associated with cPanel accounts.
  • Enhance monitoring for anomalous activity on hosting servers.

The cPanel zero-day exploitation case serves as a reminder of persistent threats facing web hosting platforms and the critical role of timely security updates in protecting internet infrastructure.

https://www.helpnetsecurity.com/2026/04/30/cpanel-zero-day-vulnerability-cve-2026-41940-exploited/

Sources used for this article

helpnetsecurity.com

Marcin Pocztowski

Real reviewer profile

Marcin Pocztowski

Infrastructure Security Editor at HackWatch.io

Open reviewer profile

Marcin Pocztowski is the owner of MMPS and an infrastructure security editor for HackWatch. His public technical record spans 20 years, from Security+ evidence dated January 2006 through Juniper, Cisco and RHCSA records, and he reviews server, network and vulnerability-response coverage for source accuracy and practical remediation.

Infrastructure Security Editor: technical-density, source-existence and remediation-logic review for infrastructure and vulnerability coverage.

Coverage focus: Server and network hardening, vulnerability response, patch prioritization and infrastructure security review

Editorial disclosure: This profile is tied to Marcin's LinkedIn, X profile and source-backed editorial work on HackWatch. Historical certificates are treated as background evidence only, not as current active credentials.

Marcin leads this vulnerability alerts coverage lane at HackWatch. This article is maintained as part of the ongoing editorial watch around "cPanel Zero-Day CVE-2026-41940 Exploited for Months Before Patch Release".

Technical review: Security+ evidence | RHCSA evidence | JNCIS-SEC evidence

Server and network infrastructure administrationKnown exploited vulnerabilities and patch prioritizationCVSS v4.0 and CISA KEV triage