HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Critical Authentication‑Bypass Vulnerability in cPanel Exposes Millions of Hosted Sites to Zero‑Day Exploits

A critical authentication‑bypass flaw in the widely‑deployed cPanel control panel has been publicly disclosed and is already being exploited in the wild. The vulnerability enables unauthenticated attackers to obtain full administrative access to any cPanel‑managed server, putting millions of hosted websites and their data at risk. Third‑party risk managers must treat cPanel as a high‑severity supply‑chain risk and verify remediation across all providers.

LiveThreat™ Intelligence · 📅 May 05, 2026· 📰 darkreading.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
darkreading.com

Critical Authentication‑Bypass Vulnerability in cPanel Threatens Millions of Hosted Websites

What Happened – A critical authentication‑bypass flaw in cPanel was publicly disclosed, and within days multiple proof‑of‑concept exploits surfaced. Researchers have observed zero‑day activity exploiting the flaw for at least a month, putting any cPanel‑managed server at risk of full admin takeover.

Why It Matters for TPRM

  • The vulnerability resides in a core control‑plane component used by thousands of hosting providers and their downstream customers.
  • Exploitation can lead to credential theft, data exfiltration, and ransomware deployment across entire multi‑tenant environments.
  • Third‑party risk programs must treat cPanel as a high‑risk supply‑chain component and verify remediation timelines.

Who Is Affected – Web‑hosting MSPs, SaaS platforms that rely on cPanel for customer site provisioning, and any organization that outsources web services to cPanel‑managed servers.

Recommended Actions

  • Verify that all cPanel instances are patched to the latest version that addresses CVE‑2025‑XXXX (or the vendor‑issued fix).
  • Conduct an inventory of all third‑party services that run cPanel and assess their patch‑management processes.
  • Implement additional monitoring for anomalous admin‑level activity on hosted servers.

Technical Notes – The flaw is an authentication bypass that allows unauthenticated attackers to obtain root‑level access via the cPanel API. No public CVE number was listed in the source, but the vulnerability is classified as “critical” with a CVSS score >9.0. Exploits leverage crafted HTTP requests to the /login/ endpoint, bypassing credential checks. Data at risk includes website files, databases, and potentially customer PII stored on compromised sites. Source: Dark Reading

📰 Original Source
https://www.darkreading.com/threat-intelligence/exploit-cyber-frenzy-critical-cpanel-vulnerability

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.