Critical cPanel & WHM Updates: Three New Security Flaws Fixed – Immediate Patching Required
cPanel & WHM patched three vulnerabilities (privilege escalation, code execution, DoS). Details of CVE-2026-29201 included. Immediate update recommended.
Introduction
cPanel and Web Host Manager (WHM) are cornerstone tools for millions of web hosting environments, providing administrators with a graphical interface to manage servers, domains, email, and security. Recently, the cPanel development team released a security update that addresses three newly discovered vulnerabilities affecting both cPanel and WHM. These flaws could allow attackers to escalate privileges, execute arbitrary code, or trigger denial-of-service (DoS) conditions. This article breaks down the vulnerabilities, their potential impact, and the critical steps system administrators must take to protect their infrastructure.

Overview of the Vulnerabilities
The three vulnerabilities were reported through responsible disclosure channels and have been assigned CVE identifiers. Although only one CVE has been publicly detailed so far, the cPanel advisory confirms that all three affect core components of the software. The known flaw is described as follows:
- CVE-2026-29201 (CVSS 3.1 Base Score: 4.3) – An insufficient input validation vulnerability exists in the
feature::LoadFeatureFileadministrative binary call. By crafting a malicious feature file name, an authenticated attacker could bypass input sanitization, potentially leading to privilege escalation or arbitrary code execution under the context of the cPanel/WHM user. - Additional vulnerabilities (CVEs not yet published) – The remaining two flaws are reported to impact privilege escalation pathways and denial-of-service resilience. One is believed to involve improper permission checks during session handling, while the other may be triggered via crafted HTTP requests causing resource exhaustion. Specific details are expected in follow-up advisories from cPanel.
Affected Versions
The vulnerabilities affect all cPanel & WHM versions prior to the latest updates. The patched versions include cPanel 110.0.13 and WHM 110.0.13 for the standard release track. Users on earlier release tracks (e.g., LTS, stable) should upgrade to the corresponding patched build as recommended by the cPanel changelog.
Potential Impact on Hosting Environments
For shared hosting providers and system administrators, these vulnerabilities pose a serious risk. Even though the CVSS score for CVE-2026-29201 is relatively moderate (4.3), the nature of the flaws – especially the privilege escalation vector – can open the door to more severe attacks. An attacker who gains low-level access to a cPanel account could exploit these bugs to:
- Access other users’ accounts or server configurations.
- Modify critical system files or inject malicious scripts.
- Disrupt server availability by triggering a DoS condition.
- Potentially pivot to other services or elevate to root-level permissions.
Given that cPanel often runs with elevated privileges, successful exploitation could lead to a full server compromise. The DoS vector, even if less severe, can still cause significant downtime for clients and revenue loss for hosting businesses.

Recommended Actions for Administrators
Immediate Patching
The most effective mitigation is to update all cPanel and WHM installations to the latest patched version. Administrators can do this via the WHM interface under “Update Configuration” or by running the following command via SSH:
/usr/local/cpanel/scripts/upcp --force
This will download and apply the latest security fixes. Do not delay – even a few hours of exposure can be exploited by automated scanning bots.
Post-Update Verification
After updating, verify that the version matches the patched release:
- In WHM: navigate to “Server Information” and check the cPanel version.
- In command line: run
/usr/local/cpanel/cpanel -V
Additionally, review system logs for any signs of attempted exploitation prior to the patch. Look for unusual entries in /var/log/messages or /usr/local/cpanel/logs/error_log related to feature::LoadFeatureFile or failed authentication attempts.
Beyond the Patch: Hardening Best Practices
While patching addresses these specific CVEs, consider these ongoing security measures to reduce overall attack surface:
- Enable two-factor authentication (2FA) for all WHM and cPanel accounts.
- Restrict administrative IP access using firewall rules.
- Regularly review and disable unused feature modules.
- Implement file integrity monitoring (e.g., Tripwire, AIDE) to detect unauthorized changes.
- Keep all server software (Apache, MySQL, PHP) up to date.
Conclusion
The release of security updates for cPanel and WHM underscores the constant vigilance required in web hosting environments. With three distinct vulnerabilities – including one with a known CVE – administrators must act swiftly to patch their servers. Failure to do so could result in privilege escalation, code execution, or service disruption. By combining immediate updates with robust security practices, organizations can protect their clients and maintain trust in their hosting infrastructure.
For the latest details, always refer to the official cPanel Security Advisories page. Stay secure.