Authentication bypass vulnerability in cPanel and WHM exploited as zero-day prior to patch
Summary
Hide ▲
Show ▼
A critical authentication bypass vulnerability (CVE-2026-41940) in cPanel, WHM, and WP Squared has been mass-exploited in 'Sorry' ransomware attacks since May 2026, compromising at least 44,000 cPanel IP addresses globally. The flaw, a CRLF injection in login and session loading processes, allows attackers to bypass authentication and gain full control over cPanel hosts, enabling deployment of a Go-based Linux encryptor that appends the '.sorry' extension to files. Encryption uses ChaCha20 with RSA-2048 key protection, rendering decryption impossible without the threat actor's private key. Ransom notes with a fixed Tox ID are dropped in each compromised folder. cPanel released emergency fixes on April 28, 2026, addressing versions 11.110.0 through 11.136.0 and WP Squared 11.136.1, with approximately 1.5 million exposed instances identified via Shodan scans. Emergency mitigations included port blocking and service suspensions.
Timeline
-
30.04.2026 14:40 2 articles · 3d ago
Zero-day authentication bypass in cPanel and WHM (CVE-2026-41940) exploited in the wild before patch
Exploitation of CVE-2026-41940 began no later than February 23, 2026, enabling attackers to bypass authentication via CRLF injection in login and session loading processes. Successful exploitation grants full control over cPanel hosts, configurations, databases, and managed websites without valid credentials. This article confirms mass exploitation of the vulnerability in active 'Sorry' ransomware campaigns, with at least 44,000 cPanel IP addresses compromised globally. The ransomware employs a Go-based Linux encryptor appending the '.sorry' extension, using ChaCha20 encryption with RSA-2048 public key protection that makes decryption impossible without the threat actor's private key. Ransom notes with Tox ID 3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724 are dropped in each compromised folder. cPanel released fixes on April 28, 2026, addressing versions 11.110.0 through 11.136.0 and WP Squared 11.136.1. Emergency mitigations included port blocking and service suspensions.
Show sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
Information Snippets
-
CVE-2026-41940 is an authentication bypass vulnerability in cPanel, WHM, and WP Squared caused by improper session handling and CRLF injection in login and session loading processes.
First reported: 30.04.2026 14:401 source, 2 articlesShow sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
Active exploitation of CVE-2026-41940 was observed in the wild as early as February 23, 2026, with successful attacks reported prior to patch availability.
First reported: 30.04.2026 14:401 source, 2 articlesShow sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
Technical details and a proof-of-concept enabling exploitation were published after disclosure, demonstrating how attackers could log in without validating passwords.
First reported: 30.04.2026 14:401 source, 1 articleShow sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
-
cPanel released fixes on April 28, 2026, addressing versions 11.110.0 through 11.136.0 and WP Squared 11.136.1, with patched builds listed (e.g., 11.136.0.5).
First reported: 30.04.2026 14:401 source, 1 articleShow sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
-
Rapid mitigation steps were recommended, including blocking ports 2083, 2087, 2095, and 2096, stopping core services (cpsrvd, cpdavd), and using a vendor-supplied detection script to identify compromise.
First reported: 30.04.2026 14:401 source, 1 articleShow sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
-
Approximately 1.5 million cPanel instances are exposed online according to Shodan scans, though the number vulnerable to CVE-2026-41940 is not quantified.
First reported: 30.04.2026 14:401 source, 2 articlesShow sources
- Critical cPanel and WHM bug exploited as a zero-day, PoC now available — www.bleepingcomputer.com — 30.04.2026 14:40
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
CVE-2026-41940 is being mass-exploited in 'Sorry' ransomware attacks to breach websites and encrypt data
First reported: 03.05.2026 00:541 source, 1 articleShow sources
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
At least 44,000 cPanel IP addresses have been compromised in ongoing attacks since the flaw's mass exploitation began
First reported: 03.05.2026 00:541 source, 1 articleShow sources
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
The 'Sorry' ransomware uses a Go-based Linux encryptor appending the '.sorry' extension to encrypted files
First reported: 03.05.2026 00:541 source, 1 articleShow sources
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
The ransomware employs ChaCha20 for encryption with RSA-2048 public key protection, making decryption impossible without the private key
First reported: 03.05.2026 00:541 source, 1 articleShow sources
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
-
Ransom notes named README.md are created in each folder with a fixed Tox ID for negotiations: 3D7889AEC00F2325E1A3FBC0ACA4E521670497F11E47FDE13EADE8FED3144B5EB56D6B198724
First reported: 03.05.2026 00:541 source, 1 articleShow sources
- Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks — www.bleepingcomputer.com — 03.05.2026 00:54
Similar Happenings
Critical Pre-Auth RCE Vulnerability in BeyondTrust Remote Support and PRA
BeyondTrust has patched a critical pre-authentication remote code execution (RCE) vulnerability (CVE-2026-1731, CVSS 9.9) in Remote Support (RS) and Privileged Remote Access (PRA) products. The flaw could allow unauthenticated attackers to execute OS commands in the context of the site user, leading to unauthorized access, data exfiltration, and service disruption. The vulnerability affects RS versions 25.3.1 and prior, and PRA versions 24.3.4 and prior. Patches are available in RS versions 25.3.2 and later, and PRA versions 25.1.1 and later. Self-hosted customers must manually apply updates if not subscribed to automatic updates. The vulnerability was discovered on January 31, 2026, with approximately 11,000 exposed instances identified, including around 8,500 on-prem deployments. BeyondTrust secured all RS/PRA cloud systems by February 2, 2026. The flaw was discovered by Harsh Jaiswal and the Hacktron AI team. Threat actors can exploit the flaw through maliciously crafted client requests in low-complexity attacks that do not require user interaction. In June 2025, BeyondTrust fixed a high-severity RS/PRA Server-Side Template Injection vulnerability. Attackers have begun actively exploiting the CVE-2026-1731 vulnerability in the wild, abusing the get_portal_info endpoint to extract the x-ns-company value before establishing a WebSocket channel. A proof-of-concept exploit targeting the /get_portal_info endpoint was published on GitHub. Threat actors have been observed exploiting CVE-2026-1731 to conduct network reconnaissance, deploy web shells, establish command-and-control (C2) channels, install backdoors and remote management tools, perform lateral movement, and exfiltrate data. The attacks have targeted financial services, legal services, high technology, higher education, wholesale and retail, and healthcare sectors across the U.S., France, Germany, Australia, and Canada. The vulnerability enables attackers to inject and execute arbitrary shell commands via the affected 'thin-scc-wrapper' script through the WebSocket interface. Attackers have deployed multiple web shells, including a PHP backdoor and a bash dropper, to maintain persistent access. Malware such as VShell and Spark RAT have been deployed as part of the exploitation. Out-of-band application security testing (OAST) techniques have been used to validate successful code execution and fingerprint compromised systems. Sensitive data, including configuration files, internal system databases, and a full PostgreSQL dump, have been exfiltrated to an external server. CVE-2026-1731 and CVE-2024-12356 share a common issue with input validation within distinct execution pathways. CVE-2026-1731 could be a target for sophisticated threat actors, similar to CVE-2024-12356 which was exploited by China-nexus threat actors like Silk Typhoon. CISA has confirmed that CVE-2026-1731 has been exploited in ransomware campaigns. CISA added CVE-2026-1731 to its Known Exploited Vulnerabilities (KEV) catalog on February 13 and gave federal agencies three days to apply the patch or stop using the product. Proof-of-concept (PoC) exploits for CVE-2026-1731 became available shortly after the initial disclosure, and exploitation was detected on January 31, making it a zero-day vulnerability for at least a week. CISA has activated the 'Known To Be Used in Ransomware Campaigns?' indicator in the KEV catalog for CVE-2026-1731. Customers of the cloud-based application (SaaS) had the patch applied automatically on February 2. Self-hosted instance customers need to either enable automatic updates or manually install the patch. For Remote Support, the recommended version is 25.3.2. For Privileged Remote Access, the recommended version is 25.1.1 or newer. Customers still using RS v21.3 and PRA v22.1 are recommended to upgrade to a newer version before applying the patch.
Sneeit WordPress RCE Exploited in Active Attacks
A critical remote code execution (RCE) vulnerability (CVE-2025-6389) in the Sneeit Framework plugin for WordPress is being actively exploited in the wild. The flaw, affecting versions up to 8.3, allows unauthenticated attackers to execute arbitrary PHP functions, including creating malicious administrator accounts and injecting backdoors. Exploitation began on November 24, 2025, with over 131,000 attack attempts blocked by Wordfence. Additionally, a critical flaw in ICTBroadcast (CVE-2025-2611) is being exploited to deliver the Frost DDoS botnet. The botnet uses multiple exploits to spread and conduct targeted DDoS attacks, with evidence pointing to a small, targeted operation.
GlassWorm malware targets OpenVSX, VS Code registries
GlassWorm has escalated into a multi-stage framework combining remote access trojans (RATs), data theft, and hardware wallet phishing, now leveraging Solana dead drops for C2, a novel browser extension for surveillance, and the Model Context Protocol (MCP) ecosystem. The campaign delivers a .NET binary targeting Ledger and Trezor devices by masquerading as configuration errors and prompting users to input recovery phrases, while a Websocket-based JavaScript RAT exfiltrates browser data and deploys HVNC or SOCKS proxy modules. The malware uses a Google Chrome extension disguised as Google Docs Offline for session surveillance on cryptocurrency platforms like Bybit and harvests extensive browser data. Recent innovations include a Zig-compiled dropper embedded within an Open VSX extension named 'specstudio.code-wakatime-activity-tracker' masquerading as WakaTime, which installs platform-specific Node.js native addons compiled from Zig code to stealthily infect all IDEs on a developer's machine. This dropper downloads a malicious VS Code extension (.VSIX) named 'floktokbok.autoimport' from an attacker-controlled GitHub account, which impersonates a legitimate extension with over 5 million installs and installs silently across all detected IDEs, avoiding execution on Russian systems and communicating with the Solana blockchain for C2. A new large-scale social engineering campaign has emerged, distributing fake VS Code security alerts posted in GitHub Discussions to automate posts across thousands of repositories using low-activity accounts, triggering GitHub email notifications with fake vulnerability advisories containing realistic CVE references. Links redirect victims through a cookie-driven chain to drnatashachinn[.]com, where a JavaScript reconnaissance payload profiles targets before delivering additional malicious payloads. This operation represents a coordinated, large-scale effort targeting developers. GlassWorm remains a persistent supply chain threat impacting npm, PyPI, GitHub, and Open VSX ecosystems. Since its emergence in October 2025, the campaign has evolved from invisible Unicode steganography in VS Code extensions to a sophisticated multi-vector operation spanning 151 compromised GitHub repositories and dozens of malicious npm packages. The threat actor, assessed to be Russian-speaking, continues to avoid infecting Russian-locale systems and leverages Solana blockchain transactions as dead drops for C2 resolution. Recent developments include the ForceMemo offshoot that force-pushes malicious code into Python repositories, the abuse of extensionPack and extensionDependencies for transitive malware delivery, and the introduction of Rust-based implants targeting developer toolchains. Eclipse Foundation and Open VSX have implemented security measures such as token revocation and automated scanning, but the threat actors have repeatedly adapted by rotating infrastructure, obfuscating payloads, and expanding into new ecosystems like MCP servers. A new wave of the GlassWorm campaign targets the OpenVSX ecosystem with 73 "sleeper" extensions that activate after updates, delivering malware to developers. Six extensions have already been activated, while the remainder remain dormant or suspicious. The campaign leverages thin loaders that fetch secondary VSIX packages or platform-specific modules at runtime, marking a shift in the group's tactics to evade detection by avoiding direct malware embedding in initial uploads. The extensions mimic legitimate listings using identical icons and near-identical names to deceive developers. Developers who installed these extensions are advised to rotate all secrets and perform a full system clean-up.
Active exploitation of critical SessionReaper flaw in Adobe Commerce and Magento Open Source
Adobe Commerce and Magento Open Source platforms are under active exploitation by hackers targeting the critical SessionReaper vulnerability (CVE-2025-54236). The flaw, with a CVSS score of 9.1, allows unauthenticated attackers to take control of customer accounts through the Commerce REST API. The patch was released on September 9, 2025, following an emergency notification to selected customers on September 4, 2025. Despite the patch, hundreds of exploitation attempts have been recorded, with many stores remaining unpatched. Adobe Commerce on Cloud customers are already protected by a WAF rule. The patch disables certain internal Magento functionalities, potentially affecting custom or external code. The vulnerability impacts multiple versions of Adobe Commerce, Adobe Commerce B2B, and Magento Open Source, as well as the Custom Attributes Serializable module. Over 250 Magento stores were hit overnight as hackers exploited the flaw, with attacks originating from five specific IP addresses. The attacks involved dropping PHP webshells or probing phpinfo to extract PHP configuration information. Exploitation activity for SessionReaper began on October 23, 2025, coinciding with the release of a proof-of-concept exploit. The threat activity has extended to 97 different IP addresses, indicating multiple actors are running mass scanners. Sansec advises that the window for safe patching has effectively closed and expects mass exploitation within the next 48 hours.
Warlock Ransomware Exploits Vulnerable SharePoint Servers
Warlock ransomware, potentially linked to Black Basta, targets unpatched on-premises Microsoft SharePoint servers. The ransomware leverages multiple vulnerabilities (CVE-2025-49706, CVE-2025-49704, CVE-2025-53770, CVE-2025-53771) to gain initial access, escalate privileges, and deploy ransomware. The campaign includes extensive reconnaissance and evasion techniques, targeting security software to avoid detection. The threat actor Storm-2603, associated with China-backed groups, has been observed using Warlock ransomware in these attacks. The ransomware gang recently auctioned files stolen from Colt Technology Services, confirming customer data was compromised. Organizations are urged to apply available patches and implement comprehensive security measures to mitigate the risk. The ToolShell exploit chain, involving CVE-2025-53770 and CVE-2025-53771, was first publicly disclosed in mid-July 2025. Chinese-based threat groups Linen Typhoon and Violet Typhoon have been actively targeting SharePoint vulnerabilities since July 2025. Active exploitation of ToolShell vulnerabilities was first observed on July 18, 2025, a day before Microsoft's emergency advisory. Cisco Talos reported that nearly all their incident response engagements related to ToolShell activity began within 10 days of the vulnerabilities being disclosed. Network segmentation is crucial to prevent lateral movement within an organization following a ToolShell exploit. Recently, SmarterTools fell victim to a ransomware attack through an unpatched instance of its SmarterMail email server. The incident occurred on January 29 and impacted the company’s office network and a data center hosting quality control testing systems, SmarterTools’ portal, and its Hosted SmarterTrack network. The attack was perpetrated by the Warlock ransomware group, which is believed to be operating out of China. The hackers likely exploited CVE-2026-24423, an unauthenticated remote code execution (RCE) vulnerability that was patched on January 15. Customers are advised to update to the latest version of SmarterMail as soon as possible.