Critical cPanel and WHM bug exploited as a zero-day, PoC now available
The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February.
What happened
Recent reporting highlighted critical cpanel and whm bug exploited as a zero-day, poc now available. The critical CVE-2026-41940 authentication bypass vulnerability in cPanel, WHM, and WP Squared is being actively exploited in the wild and has been leveraged in attempts since late February. It is unclear when exploitation started, but KnownHost, a hosting provider that uses cPanel, said the day the vulnerability was disclosed that “successful exploits have been seen in the wild” before a fix became available.
Why it matters
This matters because it has practical implications for defensive prioritisation, exposure management, or incident response rather than sitting as abstract security commentary. It is a direct signal about how compliance and policy expectations are being translated into implementation work.
Assessment
The strongest signal here is that a vulnerability class or attack path is being treated as operationally relevant rather than background technical debt. In practice, that means operators should read this as a broader signal over noise item rather than a narrow one-off.
Recommended actions
- Review whether the issue, advisory, or attack pattern is relevant to your environment, suppliers, or exposed systems
- Patch, harden, or validate logging and monitoring coverage where applicable
- Translate the development into specific ownership, policy, and evidence requirements instead of leaving it as background policy tracking
- Monitor follow-on reporting or primary-source updates for scope expansion, implementation guidance, or stronger enforcement signals
Further reading
- Primary source
- Source profile: Reporting