HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

cPanel/WHM Privilege‑Escalation, Code‑Execution & DoS Vulnerabilities (CVE‑2026‑29201) Threaten Hosting Providers

cPanel has issued patches for three critical flaws that could let attackers gain root access, execute arbitrary code, or cause denial‑of‑service on WHM servers. Hosting providers and their customers must patch immediately to avoid supply‑chain compromise.

LiveThreat™ Intelligence · 📅 May 09, 2026· 📰 thehackernews.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
thehackernews.com

cPanel/WHM Privilege‑Escalation, Code‑Execution & DoS Vulnerabilities (CVE‑2026‑29201) Threaten Hosting Providers

What It Is – cPanel released patches for three newly disclosed flaws in cPanel & Web Host Manager (WHM). One of them (CVE‑2026‑29201) scores 4.3 CVSS and stems from insufficient input validation in the feature::LOADFEATUREFILE admin‑bin call; the other two enable privilege escalation, remote code execution, and denial‑of‑service.

Exploitability – No public exploits have been observed yet, but the vulnerabilities are exploitable by authenticated or low‑privilege attackers on the management interface. The CVSS rating (4.3) reflects moderate severity, but the potential impact on multi‑tenant hosting environments raises the overall risk.

Affected Products – cPanel 115.0.0 and later, WHM 115.0.0 and later (all supported versions prior to the May 2026 patch).

TPRM Impact – Hosting providers, MSPs, and any third‑party services that rely on cPanel/WHM to deliver web‑hosting or SaaS platforms inherit the risk. A successful exploit could allow an attacker to gain root‑level access on a shared server, pivot to customer sites, exfiltrate data, or cause service outages, creating a supply‑chain exposure for downstream clients.

Recommended Actions

  • Deploy the May 2026 cPanel/WHM security update immediately on all managed servers.
  • Verify the patch level via cpanel -v and whmapi1 get_version.
  • Review audit logs for any use of the feature::LOADFEATUREFILE call or abnormal process activity.
  • Harden access to the WHM admin interface (IP allow‑lists, MFA, rate‑limiting).
  • Conduct a rapid risk assessment of any downstream customers that host critical workloads on affected instances.

Source: The Hacker News – cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now

📰 Original Source
https://thehackernews.com/2026/05/cpanel-whm-patch-3-new-vulnerabilities.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.