
[CIVN-2026-0233] Multiple Vulnerabilities in cPanel & WHM (WP2)
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in cPanel & WHM (WP2)
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
cPanel & WHM (Web Host Manager) versions:
prior to 11.136.0.9
prior to 11.134.0.25
prior to 11.132.0.31
prior to 11.130.0.22
prior to 11.126.0.58
prior to 11.124.0.37
prior to 11.118.0.66
prior to 11.110.0.117
prior to 11.102.0.41
prior to 11.94.0.30
prior to 11.86.0.43
WP Squared version prior to 11.136.1.11
Overview
Multiple vulnerabilities have been reported in cPanel & WHM, which could allow an attacker to read arbitrary files, execute arbitrary code, cause denial-of-service conditions, or escalate privileges on the targeted systems.
Target Audience:
Organizations and individuals using the affected cPanel & WHM-based hosting environments.
Risk Assessment:
High risk of escalate privileges, execute arbitrary code and read arbitrary files.
Impact Assessment:
Potential for read sensitive system files, remote code execution and denial-of -service conditions.
Description
cPanel & WHM is a widely used web hosting control panel that provides administrative (WHM) and user-level (cPanel) interfaces for managing servers and websites.
Multiple vulnerabilities exist in cPanel and WHM due to improper input validation in the ‘LOADFEATUREFILE adminbincall’ feature, insufficient input validation of the ‘plugin’ parameter in the ‘create_user API’ and unsafe symlink handling that allows a user to change permissions on arbitrary files using chmod.
Successful exploitation of these vulnerabilities could allow an attacker to read arbitrary files, execute arbitrary code, cause denial-of-service conditions, or escalate privileges on the targeted systems.
Solution
Apply appropriate software updates as mentioned by the vendor:
https://support.cpanel.net/hc/en-us/articles/40311033698327-Security-CVE-2026-29201-cPanel-WHM-WP2-Security-Update-May-08-2026
https://support.cpanel.net/hc/en-us/articles/40311426610327-Security-CVE-2026-29202-cPanel-WHM-WP2-Security-Update-May-08-2026
https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026
Vendor Information
cPanel
https://support.cpanel.net/hc/en-us/articles/40311033698327-Security-CVE-2026-29201-cPanel-WHM-WP2-Security-Update-May-08-2026
https://support.cpanel.net/hc/en-us/articles/40311426610327-Security-CVE-2026-29202-cPanel-WHM-WP2-Security-Update-May-08-2026
https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026
References
cPanel
https://support.cpanel.net/hc/en-us/articles/40311033698327-Security-CVE-2026-29201-cPanel-WHM-WP2-Security-Update-May-08-2026
https://support.cpanel.net/hc/en-us/articles/40311426610327-Security-CVE-2026-29202-cPanel-WHM-WP2-Security-Update-May-08-2026
https://support.cpanel.net/hc/en-us/articles/40311543760407-Security-CVE-2026-29203-cPanel-WHM-WP2-Security-Update-May-08-2026
CVE Name
CVE-2026-29201
CVE-2026-29202
CVE-2026-29203
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=69j1
—–END PGP SIGNATURE—–


