Over 40,000 servers compromised
A critical zero-day vulnerability in cPanel & WebHost Manager (WHM), tracked as CVE-2026-41940, is being actively exploited in the wild. This authentication bypass flaw, rated CVSS 9.8, allows unauthenticated remote attackers to gain administrative access and fully compromise servers. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added it to its Known Exploited Vulnerabilities (KEV) catalog. At its peak, over 44,000 servers were observed launching attacks, with many compromised systems being used to deploy the "Sorry" ransomware. Organizations using cPanel are urged to apply the available patches immediately to prevent a complete system takeover.
The vulnerability allows an unauthenticated attacker to write arbitrary parameters to a session file by using special characters in an authorization header. By triggering a reload of this manipulated session file, the attacker can authenticate with the injected administrative credentials, effectively gaining root-level control over the server.
Evidence suggests exploitation began as a zero-day in late February 2026, with a massive spike in attacks following public disclosure on April 28, 2026. The Shadowserver Foundation reported observing up to 44,000 unique IPs from compromised cPanel devices scanning and exploiting the vulnerability.
All versions of cPanel & WHM released after version 11.40 are vulnerable. Patches are available and must be applied immediately.
Patched Versions:
Approximately 1.5 million cPanel instances are estimated to be internet-accessible, representing a massive attack surface. The majority of compromised systems are located in the United States, France, and the Netherlands.
The vulnerability is under active and widespread exploitation by multiple threat actors. The primary post-exploitation payload observed is the Sorry Ransomware, a Go-based Linux encryptor that appends a .sorry extension to encrypted files. The widespread nature of the attacks is evident from the large number of compromised websites being indexed by Google.
T1190 - Exploit Public-Facing Application: Attackers are exploiting the CVE-2026-41940 vulnerability on internet-facing cPanel instances for initial access.T1068 - Exploitation for Privilege Escalation: The authentication bypass directly leads to administrative (root) privilege.T1486 - Data Encrypted for Impact: The deployment of "Sorry" ransomware is the final stage of the attack, designed to extort victims.The impact of this vulnerability is catastrophic for affected organizations. A successful exploit grants attackers complete control over the web server, including all hosted websites, databases, and customer data. This can lead to:
Given that many small businesses rely on cPanel hosting, the financial and operational impact could be devastating.
Security teams may want to hunt for the following patterns to identify exploitation attempts or compromise:
url_patterncpanel.* or whm.*file_path/var/cpanel/sessions/file_name*.sorry.sorry extension is a strong indicator of compromise by the associated ransomware.process_namecpaneld/usr/local/cpanel/logs/access_log) for suspicious requests containing special characters in the Authorization header, especially those resulting in a 200 OK status for authentication endpoints..sorry extension or unexpected changes to system binaries. This aligns with D3FEND's D3-FA - File Analysis.D3-NTA - Network Traffic Analysis.Immediate patching is the only effective remediation.
/scripts/upcp command to force an update.2083, 2087) to trusted IP addresses only. This is a temporary mitigating control and not a substitute for patching.D3-FR - File Restoration.Post-patch exploitation of CVE-2026-41940 intensifies; 'Sorry' ransomware now wipes backups. Attacks target MSPs and government entities, leading to an ACSC alert.
The most critical mitigation is to apply the security patches provided by cPanel immediately.
As a temporary measure, restrict access to cPanel/WHM management ports (2083, 2087) to trusted IP addresses at the network edge.
Exploitation of CVE-2026-41940 likely began as a zero-day.
The cPanel vulnerability was publicly disclosed.
Reports indicate the number of compromised servers has dropped but remains substantial.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.