HackWatch
! High riskVU Vulnerability

CISA Adds Critical cPanel and WP2 Authentication Flaw to Known Exploited Vulnerabilities Catalog

Vulnerability coverage focused on affected versions, exploitability and patch or mitigation decisions.

Exploitability matters here. Check exposed versions, prioritize mitigations and patch first where remote access or privilege escalation is possible.
CISA Adds Critical cPanel and WP2 Authentication Flaw to Known Exploited Vulnerabilities Catalog - HackWatch vulnerability alert image
HackWatch vulnerability alert image for: CISA Adds Critical cPanel and WP2 Authentication Flaw to Known Exploited Vulnerabilities Catalog
Marcin Pocztowski

Infrastructure Security Editor

Marcin Pocztowski

Infrastructure and Vulnerability Response

By: Marcin Pocztowski

Responsible editor: Marcin Pocztowski / Infrastructure and Vulnerability Response

Infrastructure Security Editor: Marcin Pocztowski / Infrastructure and Vulnerability Response

Last reviewed by: Marcin Pocztowski on Apr 30, 2026

Technical review credentials: Security+ evidence | RHCSA evidence | JNCIS-SEC evidence

Published on HackWatch: Apr 30, 2026

Source date: Apr 30, 2026

Last updated: Apr 30, 2026

Incident status: Mitigation available

Last verified: Apr 30, 2026

Corroborating sources: 2

Trust note:This alert is maintained under HackWatch's editorial policy, with visible source records, a named responsible editor and a correction channel for disputed facts.

AI tools may assist HackWatch with initial monitoring and source clustering. The public article is reviewed, fact-checked and edited by a real HackWatch reviewer before publication or material updates. Last human review: Apr 30, 2026.

Technical reviewer note: Marcin Pocztowski reviewed this alert on Apr 30, 2026 from an administrator's point of view, checking CVE-2026-41940 against vendor, CVE and advisory context before accepting the risk language. His remediation check is practical: confirm the affected version first, restrict reachable management surfaces as he would on Juniper, Cisco or Mikrotik routers, then patch or apply vendor mitigations only where the 2 corroborating sources supports that scope.

Review our editorial policy or send corrections to [email protected].

Mitigation available. Mitigation guidance or a workaround is available, but defenders should still verify rollout status and exposure.

The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2026-41940, a missing authentication vulnerability affecting WebPros cPanel & WHM and WP2 (WordPress Squared), to its Known Exploited Vulnerabilities Catalog following evidence of active exploitation. Federal agencies must address this flaw under Binding Operational Directive 22-01, while all organizations are urged to prioritize remediation to mitigate significant cyber risks.

WASHINGTON, April 30, 2026, 13:58 UTC

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability, CVE-2026-41940, to its Known Exploited Vulnerabilities (KEV) Catalog. This flaw affects WebPros cPanel & WHM and WP2 (WordPress Squared) platforms and involves missing authentication for a critical function, enabling attackers to bypass security controls.

CISA's decision follows confirmed reports of active exploitation targeting this vulnerability. The agency emphasized the heightened risk this poses to federal networks and the broader digital ecosystem.

The inclusion of CVE-2026-41940 in the KEV Catalog triggers mandatory remediation requirements for Federal Civilian Executive Branch (FCEB) agencies under Binding Operational Directive (BOD) 22-01. This directive compels agencies to patch or mitigate listed vulnerabilities by specified deadlines to reduce exposure to active cyber threats.

While BOD 22-01 applies only to federal agencies, CISA strongly recommends that all organizations using affected platforms prioritize patching this vulnerability. Attackers frequently exploit missing authentication flaws to gain unauthorized access, potentially leading to data breaches, service disruptions, or further system compromise.

WebPros cPanel & WHM is widely used for web hosting management, while WP2 is a WordPress derivative popular for content management. The vulnerability allows threat actors to execute critical functions without proper authentication, amplifying the risk of unauthorized administrative actions.

CISA continues to update the KEV Catalog as new evidence emerges, underscoring the dynamic nature of cyber threats. Organizations are urged to integrate KEV Catalog monitoring into their vulnerability management programs to stay ahead of active exploits.

Failure to remediate such vulnerabilities promptly can result in significant operational and reputational damage. Past incidents involving similar authentication bypass flaws have led to ransomware attacks and data theft.

Security teams should verify their use of affected software versions and apply vendor patches immediately. Where patches are unavailable, implementing compensating controls such as network segmentation and enhanced monitoring can reduce risk.

The KEV Catalog serves as a critical tool for prioritizing cybersecurity efforts. Its living list reflects vulnerabilities with confirmed exploitation, helping organizations allocate resources efficiently.

Given the widespread deployment of cPanel and WordPress platforms, this vulnerability's exploitation could have far-reaching impacts beyond federal networks.

CISA's alert and the KEV Catalog update are accessible on the agency's website, providing detailed guidance on mitigation steps.

Organizations should also review their incident response plans to prepare for potential exploitation attempts targeting this vulnerability.

The evolving threat landscape demands continuous vigilance. Incorporating KEV Catalog advisories into routine security assessments is essential for proactive defense.

In summary, CVE-2026-41940 represents a high-risk vulnerability requiring immediate attention from federal agencies and private sector users alike.

Failure to act swiftly could expose critical infrastructure and sensitive data to malicious actors exploiting authentication weaknesses.

Source: https://www.cisa.gov/news-events/alerts/2026/04/30/cisa-adds-one-known-exploited-vulnerability-catalog

Sources used for this article

securityweek.com, cisa.gov

Marcin Pocztowski

Real reviewer profile

Marcin Pocztowski

Infrastructure Security Editor at HackWatch.io

Open reviewer profile

Marcin Pocztowski is the owner of MMPS and an infrastructure security editor for HackWatch. His public technical record spans 20 years, from Security+ evidence dated January 2006 through Juniper, Cisco and RHCSA records, and he reviews server, network and vulnerability-response coverage for source accuracy and practical remediation.

Infrastructure Security Editor: technical-density, source-existence and remediation-logic review for infrastructure and vulnerability coverage.

Coverage focus: Server and network hardening, vulnerability response, patch prioritization and infrastructure security review

Editorial disclosure: This profile is tied to Marcin's LinkedIn, X profile and source-backed editorial work on HackWatch. Historical certificates are treated as background evidence only, not as current active credentials.

Marcin leads this vulnerability alerts coverage lane at HackWatch. This article is maintained as part of the ongoing editorial watch around "CISA Adds Critical cPanel and WP2 Authentication Flaw to Known Exploited Vulnerabilities Catalog".

Technical review: Security+ evidence | RHCSA evidence | JNCIS-SEC evidence

Server and network infrastructure administrationKnown exploited vulnerabilities and patch prioritizationCVSS v4.0 and CISA KEV triage