Vulnerability

Three Critical cPanel and WHM Vulnerabilities Enable Code Execution, File Reads, and DoS Attacks

dark6 11 May 2026
Read Time:3 Minute, 46 Second

cPanel has disclosed three critical security vulnerabilities tracked as CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203 affecting its widely deployed cPanel & WHM web hosting control panel and WP Squared (WP2) platform. The flaws, patched on May 8, 2026, expose servers to arbitrary file reads, Perl code injection, and denial-of-service (DoS) attacks — making immediate patching essential for hosting providers and server administrators worldwide.

This disclosure comes weeks after another cPanel vulnerability (CVE-2026-41940) was exploited in the wild, enabling attackers to completely bypass login mechanisms. The new trio of vulnerabilities raises fresh concerns about the security posture of shared hosting environments that rely on cPanel at scale.

CVE-2026-29201: Arbitrary File Read via Path Traversal

The first vulnerability resides in the feature::LOADFEATUREFILE adminbin call, which fails to adequately validate the feature file name parameter. An attacker can pass a relative path as the argument, causing an arbitrary file on the server to be made world-readable.

This type of path traversal flaw can expose sensitive system files, including configuration files, credentials, and private keys — giving attackers a foothold for deeper compromise. In shared hosting environments where dozens or hundreds of tenants reside on a single server, this kind of exposure can cascade into a multi-tenant breach.

CVE-2026-29202: Perl Code Injection in User Creation API

The second and most severe flaw is a Perl code injection vulnerability discovered in the create_user API call, specifically related to the plugin parameter. When unsanitized input reaches this parameter, attackers can inject and execute arbitrary Perl code on the server.

Remote code execution (RCE) vulnerabilities of this nature carry the highest risk, potentially allowing full server takeover, data exfiltration, and deployment of malware or backdoors across hosted environments. Security teams should treat this as the highest-priority item in their remediation queue.

CVE-2026-29203: Unsafe Symlink Handling Leads to DoS and Privilege Abuse

The third flaw stems from unsafe symlink handling that permits a user to chmod an arbitrary file on the system. This misconfiguration can be exploited to disrupt critical system operations, resulting in denial-of-service conditions. It could also be chained with other vulnerabilities to escalate privileges and gain unauthorized administrative access.

In multi-tenant hosting environments, privilege escalation of this kind could allow a low-privileged tenant to affect other users on the same server — a serious threat to platform integrity.

Affected Versions and Patched Releases

All three vulnerabilities affect the same range of cPanel & WHM versions. cPanel has released patches across all active branches. Administrators should update to one of the following versions or higher:

  • 11.136.0.9
  • 11.134.0.25
  • 11.132.0.31
  • 11.130.0.22
  • 11.126.0.58
  • 11.124.0.37
  • 11.118.0.66
  • 11.110.0.116 / 11.110.0.117
  • 11.102.0.41
  • 11.94.0.30
  • 11.86.0.43

WP Squared users should upgrade to version 11.136.1.10 or higher. Servers running CentOS 6 or CloudLinux 6 can apply a direct update to version 110.0.114 by first setting the upgrade tier with the command:

sed -i "s/CPANEL=.*/CPANEL=cl6110/g" /etc/cpupdate.conf

How to Apply the Patch

Administrators can update their cPanel installation immediately by running the forced update script:

/scripts/upcp --force

Once completed, verify the installed version using:

/usr/local/cpanel/cpanel -V

Confirm the version matches one of the patched releases listed above before considering the remediation complete. After patching, administrators are also advised to review server logs for any signs of exploitation activity, particularly around the create_user API endpoint and any recent feature file loading operations.

Why This Matters for Hosting Providers

cPanel and WHM powers an estimated tens of millions of websites across shared hosting environments worldwide. Because multiple tenants operate on a single server in shared hosting, vulnerabilities that allow one tenant to read files belonging to another — or to execute arbitrary code — can result in catastrophic, cascading breaches.

Given that CVE-2026-29202 enables direct code execution and CVE-2026-29203 opens the door to privilege escalation, hosting providers running unpatched cPanel installations face significant exposure to lateral movement and full server compromise. With a previous cPanel zero-day having already been exploited in the wild this year, threat actors are clearly aware of — and actively targeting — this ecosystem.

Administrators are urged to apply available patches without delay and monitor for any anomalous activity consistent with file traversal or unauthorized API calls.

Leave a Reply

💬 [[ unisciti alla discussione! ]]


Se vuoi commentare su Three Critical cPanel and WHM Vulnerabilities Enable Code Execution, File Reads, and DoS Attacks, utilizza la discussione sul Forum.
Condividi esempi, IOCs o tecniche di detection efficaci nel nostro 👉 forum community