The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw affecting WebPros cPanel to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2026-41940 and carrying a CVSS score of 9.3, this vulnerability represents a severe risk to the managed hosting ecosystem.
For defenders, the addition to the KEV catalog is the definitive signal: theoretical risk has graduated to active exploitation. In environments where cPanel controls web interfaces, email, and DNS, a compromise of this control panel often equates to a total server breach. Given CISA's Binding Operational Directive (BOD) 22-01, federal agencies have a deadline to patch, but for private sector SOC teams, the urgency is immediate.
Technical Analysis
- Affected Product: WebPros cPanel & WHM
- CVE Identifier: CVE-2026-41940
- CVSS Score: 9.3 (Critical)
- Vulnerability Type: Remote Code Execution (RCE)
How it Works:
CVE-2026-41940 allows an authenticated attacker (or potentially unauthenticated, depending on specific configuration) to execute arbitrary code on the underlying Linux operating system. The vulnerability exists within a specific component of the cPanel web interface. By sending a specially crafted request to the web server (typically running on ports 2083, 2087, or 2096), an attacker can exploit a flaw in input sanitization or deserialization to force the cPanel daemon (cpsrvd) to spawn a malicious shell or command.
Attack Chain:
- Recon: Attacker identifies cPanel login ports (2082/2083/2086/2087).
- Exploitation: Attacker sends malicious payload to the vulnerable endpoint.
- Execution: The
cpsrvdprocess (running as root or a privileged user) executes the payload (e.g.,/bin/bashorcurl). - Objective: Establishment of a webshell, reverse shell, or deployment of cryptocurrency miners/ransomware.
Exploitation Status: CISA has confirmed evidence of active exploitation. This is not a drill; scanners and exploit frameworks are already probing for this vulnerability in the wild.
Detection & Response
Detecting exploitation of cPanel requires focusing on the parent-child process relationships. The standard behavior of a web control panel is to serve HTTP requests; it should rarely, if ever, spawn system shells directly.
SIGMA Rules
---
title: cPanel RCE Suspicious Child Process
id: 9a8b7c6d-5e4f-3a2b-1c0d-9e8f7a6b5c4d
status: experimental
description: Detects potential exploitation of CVE-2026-41940 by identifying the cPanel daemon spawning shells or network tools.
references:
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
author: Security Arsenal
date: 2025/05/20
tags:
- attack.execution
- attack.t1059.004
logsource:
category: process_creation
product: linux
detection:
selection:
ParentImage|endswith: '/usr/local/cpanel/cpsrvd'
Image|endswith:
- '/bin/bash'
- '/bin/sh'
- '/usr/bin/curl'
- '/usr/bin/wget'
- '/usr/bin/python'
- '/usr/bin/perl'
condition: selection
falsepositives:
- Legitimate administrative use of cPanel terminal interface (rare)
level: critical
---
title: Webshell Creation via cPanel Tmp
id: 1a2b3c4d-5e6f-7a8b-9c0d-1e2f3a4b5c6d
status: experimental
description: Detects suspicious file writes to the cPanel temporary directory or web root by the cPanel process, common in webshell uploads.
references:
- https://attack.mitre.org/techniques/T1505/003/
author: Security Arsenal
date: 2025/05/20
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: file_create
product: linux
detection:
selection:
ProcessImage|endswith: '/usr/local/cpanel/cpsrvd'
TargetFilename|contains:
- '/tmp/'
- '/home/*/public_html/'
TargetFilename|endswith:
- '.php'
- '.php5'
- '.phtml'
- '.sh'
condition: selection
falsepositives:
- Legitimate file uploads via web interface
level: high
KQL (Microsoft Sentinel)
Hunting for suspicious process lineage in Syslog or DeviceProcessEvents. cPanel exploitation is characterized by the web server daemon dropping into a shell.
DeviceProcessEvents
| where InitiatingProcessFileName endswith "cpsrvd"
| where FileName in~ ("bash", "sh", "curl", "wget", "python", "perl", "nc", "telnet")
| project Timestamp, DeviceName, AccountName, InitiatingProcessCommandLine, ProcessCommandLine, FileName
| order by Timestamp desc
Velociraptor VQL
This artifact hunts for the specific parent-child relationship indicative of a successful RCE attack against the cPanel daemon.
-- Hunt for cPanel cpsrvd spawning shells or network tools
SELECT Pid, Ppid, Name, Exe, CommandLine, Username
FROM pslist()
WHERE Ppid IN (SELECT Pid FROM pslist() WHERE Name = "cpsrvd")
AND Name IN ("bash", "sh", "curl", "wget", "python3", "perl")
Remediation Script
Bash Script: Verify cPanel version and force an update to patch CVE-2026-41940.
#!/bin/bash
# Security Arsenal Remediation Script for CVE-2026-41940
# Checks cPanel version and forces update
echo "[+] Checking current cPanel version..."
/usr/local/cpanel/cpanel -V
echo "[+] Checking for available updates..."
/usr/local/cpanel/scripts/upcp --check-only
echo "[!] Initiating forced update to patch CVE-2026-41940..."
# This command forces a full update regardless of update settings
/usr/local/cpanel/scripts/upcp --force
echo "[+] Update complete. Verifying installed version..."
/usr/local/cpanel/cpanel -V
echo "[+] Remediation check finished. Please review /var/cpanel/updatelogs/latest for errors."
Remediation
- Patch Immediately: Update to the latest version of WebPros cPanel & WHM. The vendor has released patches addressing CVE-2026-41940. Ensure your update tier is set to "Release" or "Current" track rather than "Stable" to receive security fixes fastest.
- Verify Update: Run
/usr/local/cpanel/cpanel -Vto confirm the patch level. - Review Access Logs: Inspect
/usr/local/cpanel/logs/access_logfor suspicious POST requests to cPanel endpoints around the time of the patch release. - CISA Deadline: Per BOD 22-01, federal civilian executive branch agencies (FCEB) must remediate this vulnerability by the deadline specified in the KEV catalog entry (typically within 3 weeks).
Vendor Advisory: WebPros cPanel Security
Related Resources
Security Arsenal Penetration Testing Services AlertMonitor Platform Book a SOC Assessment vulnerability-management Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.