cPanel Ships Second Emergency Patch in 10 Days: Three New CVEs
cPanel releases emergency fixes for CVE-2026-29201, 29202, and 29203—including file read, code execution, and privilege escalation flaws. Comes days after 44,000 servers were hit by ransomware.
cPanel released its second emergency security update in ten days on May 8, patching three new vulnerabilities that enable arbitrary file read, code execution, and privilege escalation. The timing couldn't be worse: this follows the CVE-2026-41940 auth bypass that saw 44,000 servers compromised and ransomware deployed across hosting providers worldwide.
The new CVEs—CVE-2026-29201, CVE-2026-29202, and CVE-2026-29203—affect cPanel & WHM, the control panel software that manages an estimated 70 million domains globally.
CVE-2026-29201: Arbitrary File Read
The first vulnerability exists in the feature::LOADFEATUREFILE adminbin call. The feature file name parameter isn't validated for path traversal, allowing an attacker to supply a relative path that causes any file on the server to become world-readable.
While arbitrary file read doesn't directly grant code execution, it enables attackers to:
- Extract configuration files containing database credentials
- Read SSH private keys from user home directories
- Access backup files that may contain sensitive data
- Harvest information needed for privilege escalation attacks
CVE-2026-29202: Code Execution
Details on CVE-2026-29202 remain limited, but cPanel confirms it enables direct code execution. Combined with CVE-2026-29201's file read capability, an attacker could potentially read server configuration, identify exploitation paths, and achieve code execution in a chained attack.
CVE-2026-29203: Privilege Escalation via Symlink
The third vulnerability (CVSS 8.8) involves unsafe handling of symbolic links. An authenticated user can use chmod to modify permissions on arbitrary files through symlink manipulation, leading to denial of service or privilege escalation.
The attack works by creating a symlink in a user-controlled directory that points to a sensitive system file. When cPanel processes chmod operations, it follows the symlink and applies permission changes to the target file instead of the symlink itself.
Context: cPanel's Rough Month
This patch arrives while the hosting industry is still recovering from CVE-2026-41940. That CVSS 9.8 authentication bypass went unpatched for nearly three months while attackers exploited it in the wild. By the time cPanel shipped a fix in late April, the Sorry ransomware gang had compromised 44,000 servers and encrypted data across multiple hosting providers.
The quick succession of emergency patches raises questions about cPanel's security review processes. Two TSRs (Targeted Security Releases) in ten days suggests either proactive discovery of related issues or—less charitably—that the auth bypass scrutiny revealed additional problems that had been overlooked.
Affected Versions
All cPanel & WHM versions before the May 8 patch are vulnerable. The fix was distributed through cPanel's automatic update process starting at 12:00 PM EST.
Remediation
Most cPanel installations receive automatic updates. Administrators should verify their servers are running the patched version:
/usr/local/cpanel/cpanel -V
For servers with automatic updates disabled, run the manual update:
/scripts/upcp
Given the active exploitation of CVE-2026-41940, administrators should also audit their servers for signs of prior compromise. The Sorry ransomware campaign left clear indicators, but other attackers may have established persistence more quietly during the months the auth bypass was exploitable.
Hosting providers running cPanel should review our data breach response guide for steps on assessing exposure and notifying affected customers.
Why This Matters
cPanel's market dominance in shared hosting means these vulnerabilities affect millions of websites. Shared hosting environments are particularly sensitive to privilege escalation flaws—a single compromised account can potentially pivot to attack neighboring sites on the same server.
The back-to-back emergency patches also demonstrate the challenges of securing legacy codebases. cPanel has been in development since 1996, and the accumulated complexity makes comprehensive security review difficult. Organizations with strict security requirements should evaluate whether cPanel's convenience outweighs the risks of its expanding attack surface.
Related Articles
Dirty Frag: Zero-Day Linux Exploit Gives Root With No Patches
A new Linux kernel flaw dubbed Dirty Frag (CVE-2026-43284) enables instant root on all major distros. No patches exist after embargo collapsed.
May 8, 2026Linux Copy Fail Flaw Grants Root in Seconds — Patch Now
CVE-2026-31431 lets attackers gain root on every major Linux distro since 2017 with a 732-byte Python script. Here's how it works and what to do.
Apr 30, 2026OpenClaw Pairing Flaw Enables CVSS 9.1 Privilege Escalation
CVE-2026-41386 allows attackers to manipulate bootstrap setup codes during device pairing, bypassing role restrictions and gaining elevated privileges in OpenClaw.
Apr 29, 2026cPanel Auth Bypass CVE-2026-41940 Exploited Before Patch
Critical CVSS 9.8 flaw in cPanel/WHM allowed attackers to bypass authentication via CRLF injection. Exploits confirmed in the wild before emergency patches.
Apr 29, 2026