CISA has added a critical cPanel bug to its known-exploited list, confirming that attackers are already poking holes in one of the internet’s most widely used hosting stacks.
The vulnerability, tracked as CVE-2026-41940, carries a near-worst-case CVSS score of 9.8 and affects all supported versions of cPanel and Web[Host Manager (WHM) released after version 11.40, along with WP Squared, a WordPress management layer built on top of the same platform.
In plain terms, a successful exploit can hand over full control of the server.
The US government’s cybersecurity agency added the flaw to its Known Exploited Vulnerabilities catalog on Thursday, confirming attackers are not waiting around. By the time cPanel shipped a patch on Tuesday, exploitation was already underway.
Hosting provider KnownHost has been more explicit about what that looked like in practice, warning customers it had seen successful exploitation attempts before any fix was available. In a Reddit post, the company’s CEO, Daniel Pearson, said the provider had “seen execution attempts as early as 2/23/2026” and urged users to restrict access and assume systems could already be compromised if left unpatched.
Another hosting provider, Namecheap, says it temporarily blocked access to cPanel and WHM, effectively slamming the door shut until fixes were ready. It has since begun rolling out updates.
There are also early signs of what those attackers are up to once they get in. A small business owner posting on Reddit said their company had been hit by ransomware after running what they described as a fairly standard cPanel setup, adding that their hosting provider appeared to be struggling under the weight of the incident. The attackers, they said, demanded $7,000 to unlock systems.
The claim is anecdotal, but if it holds up, it suggests this bug is already being used by criminals to lock up systems, not just lurk quietly or skim data in the background.
It’s not yet known how many organizations have been impacted by the vulnerability, but security firm Rapid7 used Shodan to identify roughly 1.5 million internet-exposed cPanel instances.
cPanel underpins hosting for tens of millions of sites, many run by small outfits that rely on providers to handle security. For them, “patch now” often means “wait and hope,” which is not a great place to be when a near-max severity bug is already being weaponized. ®

