Widespread Exploitation of Critical cPanel Zero-Day Flaw (CVE-2026-41940) Leads to Mass Server Compromise and Ransomware Attacks

Critical cPanel Zero-Day (CVE-2026-41940) Actively Exploited, Over 40,000 Servers Compromised

CRITICAL
May 4, 2026
May 5, 2026
5m read
VulnerabilityRansomwareCyberattack

Impact Scope

People Affected

Over 40,000 servers compromised

Industries Affected

TechnologyOther

Geographic Impact

United StatesFranceNetherlands (global)

Related Entities(initial)

Organizations

Other

Sorry RansomwareWatchTowrGoogle

CVE Identifiers

CVE-2026-41940
CRITICAL
CVSS:9.8

Full Report(when first published)

Executive Summary

A critical zero-day vulnerability in cPanel & WebHost Manager (WHM), tracked as CVE-2026-41940, is being actively exploited in the wild. This authentication bypass flaw, rated CVSS 9.8, allows unauthenticated remote attackers to gain administrative access and fully compromise servers. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added it to its Known Exploited Vulnerabilities (KEV) catalog. At its peak, over 44,000 servers were observed launching attacks, with many compromised systems being used to deploy the "Sorry" ransomware. Organizations using cPanel are urged to apply the available patches immediately to prevent a complete system takeover.


Vulnerability Details

  • CVE ID: CVE-2026-41940
  • CVSS Score: 9.8 (Critical)
  • Vulnerability Type: Authentication Bypass
  • Affected Software: cPanel & WHM versions after 11.40

The vulnerability allows an unauthenticated attacker to write arbitrary parameters to a session file by using special characters in an authorization header. By triggering a reload of this manipulated session file, the attacker can authenticate with the injected administrative credentials, effectively gaining root-level control over the server.

Evidence suggests exploitation began as a zero-day in late February 2026, with a massive spike in attacks following public disclosure on April 28, 2026. The Shadowserver Foundation reported observing up to 44,000 unique IPs from compromised cPanel devices scanning and exploiting the vulnerability.


Affected Systems

All versions of cPanel & WHM released after version 11.40 are vulnerable. Patches are available and must be applied immediately.

Patched Versions:

  • 11.86.0.41
  • 11.110.0.97
  • 11.118.0.63
  • 11.124.0.35
  • 11.126.0.54
  • 11.130.0.19
  • 11.132.0.29
  • 11.134.0.20
  • 11.136.0.5

Approximately 1.5 million cPanel instances are estimated to be internet-accessible, representing a massive attack surface. The majority of compromised systems are located in the United States, France, and the Netherlands.


Exploitation Status

The vulnerability is under active and widespread exploitation by multiple threat actors. The primary post-exploitation payload observed is the Sorry Ransomware, a Go-based Linux encryptor that appends a .sorry extension to encrypted files. The widespread nature of the attacks is evident from the large number of compromised websites being indexed by Google.

MITRE ATT&CK Techniques


Impact Assessment

The impact of this vulnerability is catastrophic for affected organizations. A successful exploit grants attackers complete control over the web server, including all hosted websites, databases, and customer data. This can lead to:

  • Widespread Ransomware Deployment: Encrypting all data on the server and demanding a ransom.
  • Data Theft: Exfiltration of sensitive business and customer data from all hosted sites.
  • Website Defacement and Malware Hosting: Using the compromised server to host phishing pages, malware, or launch further attacks.
  • Reputational Damage: Significant loss of trust for hosting providers and their customers.

Given that many small businesses rely on cPanel hosting, the financial and operational impact could be devastating.


Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to identify exploitation attempts or compromise:

Type
url_pattern
Value
cpanel.* or whm.*
Description
Monitor web server logs for requests containing unusual authorization headers targeting cPanel/WHM endpoints.
Type
file_path
Value
/var/cpanel/sessions/
Description
Monitor for anomalous writes or modifications to session files in this directory.
Type
file_name
Value
*.sorry
Description
The presence of files with the .sorry extension is a strong indicator of compromise by the associated ransomware.
Type
process_name
Value
cpaneld
Description
Look for anomalous child processes spawned by the main cPanel daemon.

Detection Methods

  1. Vulnerability Scanning: Run authenticated and unauthenticated scans against servers to identify vulnerable cPanel & WHM versions.
  2. Log Analysis: Scrutinize web server access logs (e.g., /usr/local/cpanel/logs/access_log) for suspicious requests containing special characters in the Authorization header, especially those resulting in a 200 OK status for authentication endpoints.
  3. File Integrity Monitoring (FIM): Use FIM to monitor for the creation of files with the .sorry extension or unexpected changes to system binaries. This aligns with D3FEND's D3-FA - File Analysis.
  4. Network Traffic Analysis: Monitor for outbound connections from cPanel servers to known malicious IPs or unusual ports, which could indicate C2 communication or data exfiltration. This uses D3-NTA - Network Traffic Analysis.

Remediation Steps

Immediate patching is the only effective remediation.

  1. Update Immediately: Update cPanel & WHM to one of the patched versions listed above. Use the /scripts/upcp command to force an update.
  2. Restrict Access: If patching is not immediately possible, restrict access to the cPanel/WHM interface (ports 2083, 2087) to trusted IP addresses only. This is a temporary mitigating control and not a substitute for patching.
  3. Incident Response: If compromise is suspected, isolate the server from the network, preserve logs and disk images for forensic analysis, and initiate your incident response plan. Assume all credentials, keys, and data on the server are compromised.
  4. Restore from Backup: If infected with ransomware, restore from clean, offline backups after rebuilding the server from a trusted image. This is a key part of D3FEND's D3-FR - File Restoration.

Timeline of Events

1
February 1, 2026
Exploitation of CVE-2026-41940 likely began as a zero-day.
2
April 28, 2026
The cPanel vulnerability was publicly disclosed.
3
May 3, 2026
Reports indicate the number of compromised servers has dropped but remains substantial.
4
May 4, 2026
This article was published

Article Updates

May 5, 2026

Post-patch exploitation of CVE-2026-41940 intensifies; 'Sorry' ransomware now wipes backups. Attacks target MSPs and government entities, leading to an ACSC alert.

MITRE ATT&CK Mitigations

The most critical mitigation is to apply the security patches provided by cPanel immediately.

As a temporary measure, restrict access to cPanel/WHM management ports (2083, 2087) to trusted IP addresses at the network edge.

Audit

M1047enterprise

Implement continuous monitoring of web server and application logs to detect anomalous authentication attempts and other signs of exploitation.

Timeline of Events

1
February 1, 2026

Exploitation of CVE-2026-41940 likely began as a zero-day.

2
April 28, 2026

The cPanel vulnerability was publicly disclosed.

3
May 3, 2026

Reports indicate the number of compromised servers has dropped but remains substantial.

Sources & References(when first published)

Over 40,000 Servers Compromised in Ongoing cPanel Exploitation
SecurityWeek (securityweek.com) May 4, 2026
Critrical cPanel flaw mass-exploited in "Sorry" ransomware attacks
BleepingComputer (bleepingcomputer.com) May 2, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

cPanelWHMCVE-2026-41940Zero-DayRansomwareSorry RansomwareVulnerabilityPatch Management

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.